Search Results - (( java implementing function algorithm ) OR ( system implementation case algorithm ))
Search alternatives:
- implementing function »
- system implementation »
- implementation case »
- function algorithm »
- java implementing »
- case algorithm »
-
1
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
3
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
Get full text
Get full text
Thesis -
5
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
Get full text
Get full text
Final Year Project -
6
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
7
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020“…PHPMyAdmin is used to store the dataset and also acts as a database for user information. The algorithm chosen was implemented using Java Programming language and was tested using Root Means Square Error (RMSE) formula.…”
Get full text
Get full text
Thesis -
8
PID control system implementation in embedded system for DC motor speed control
Published 2008“…PID algorithm that has been implemented in MCU inside the DC motor controller module system can eliminate the steady state error and overshoot problem including settling time. …”
Get full text
Get full text
Undergraduates Project Papers -
9
Songs Search Using Human Humming Voice
Published 2007“…The system has the functionality of humming voice recording and algorithms comparing both humming voice and song files in the system to fmd the right song. …”
Get full text
Get full text
Final Year Project -
10
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023“…Within the GA, nearest neighbor algorithm is used in determining the most similar recorded case that can be used in solving the new case. …”
Conference paper -
11
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…E-Certificate helps eliminate many problems that is associated with physical printed certificate such costs, management, and forgery problem. Even though implementation of such E-Certificate have been implemented around the globe, it has not been implemented for workshops in UiTM. …”
Get full text
Get full text
Thesis -
12
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
Get full text
Get full text
Thesis -
13
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
14
A novel N-input voting algorithm for X-by-wire fault-tolerant systems
Published 2014“…Depending on the characteristics of the application and the type of selected voter, the voting algorithms can be implemented for either hardware or software systems. …”
Get full text
Get full text
Get full text
Article -
15
Implementation of case-based reasoning in help desk system
Published 2019“…Besides of time consuming when solving customers’ problem, the personnel also faced inherently knowledge problem during help desk operation and difficulty in assessing abundant case data without a systematic system. The aim of this research is to design and develop a Help Desk System used by tourism sector by applying Case-based Reasoning (CBR) algorithm. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
16
Manufacturing process planning optimisation in reconfigurable multiple parts flow lines
Published 2008“…The case study is based on the manufacturing system. …”
Get full text
Get full text
Get full text
Article -
17
-
18
Indoor navigation system using Dijkstra's algorithm for emergency situation / Mohd Faizulhayad Mashuri
Published 2015“…This research discuss on an implementation of route planning in Indoor Navigation System (INS) for emergency situation. …”
Get full text
Get full text
Thesis -
19
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
20
An integrated algorithm of analytical network process with case-based reasoning to support the selection of an ideal football team formation and players
Published 2021“…The system was implemented to Kedah Football Association (KFA) where several experimental data were tested. …”
Get full text
Get full text
Get full text
Thesis
