Search Results - (( java implementing function algorithm ) OR ( through implementation case algorithm ))

Refine Results
  1. 1

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Movie recommendation system / Najwa Syamimie Hasnu by Hasnu, Najwa Syamimie

    Published 2020
    “…PHPMyAdmin is used to store the dataset and also acts as a database for user information. The algorithm chosen was implemented using Java Programming language and was tested using Root Means Square Error (RMSE) formula.…”
    Get full text
    Get full text
    Thesis
  6. 6

    Songs Search Using Human Humming Voice by Abdul Rahman, Mohamad Ariff

    Published 2007
    “…The system has the functionality of humming voice recording and algorithms comparing both humming voice and song files in the system to fmd the right song. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…E-Certificate helps eliminate many problems that is associated with physical printed certificate such costs, management, and forgery problem. Even though implementation of such E-Certificate have been implemented around the globe, it has not been implemented for workshops in UiTM. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Face recognition and identification system (FaceRec) / Khew Jye Huei by Khew , Jye Huei

    Published 2004
    “…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Implementation of RIO in UMJaNetSim / Chan Chin We by Chan, Chin We

    Published 2004
    “…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
    Get full text
    Get full text
    Thesis
  12. 12

    Manufacturing process planning optimisation in reconfigurable multiple parts flow lines by Ismail, Napsiah, Musharavati, Farayi, Hamouda, Abdel Magid Salem, Ramli, Abdul Rahman

    Published 2008
    “…In comparison to MGAWTO, the implemented MGATO improves the population diversity through a customized threshold operator. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A study of fluctuations and confidence of implementation in genetic algorithm optimized network in data centre by Nurika, O., Hassan, M.F., Zakaria, N., Jung, L.T.

    Published 2018
    “…The reliability of genetic algorithm may vary based on implementation case, hence it is necessary to investigate its performance pattern for each implementation case. …”
    Get full text
    Get full text
    Article
  14. 14

    A study of fluctuations and confidence of implementation in genetic algorithm optimized network in data centre by Nurika, O., Hassan, M.F., Zakaria, N., Jung, L.T.

    Published 2018
    “…The reliability of genetic algorithm may vary based on implementation case, hence it is necessary to investigate its performance pattern for each implementation case. …”
    Get full text
    Get full text
    Article
  15. 15

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. The image clustering is major part of data mining where study about how to binds the similar data together in a cluster and show the meaningful data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    COVID-19 DATA EXPLORATION USING MAPPER ALGORITHM by Carey, Ling Yu Fan

    Published 2023
    “…Application of mapper algorithm through Kepler Mapper, a python implementation of mapper is done to construct mapper graphs for state wise COVID�19 data in Malaysia along year 2021. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  18. 18

    A novel N-input voting algorithm for X-by-wire fault-tolerant systems by Karimi, Abbas, Zarafshan, Faraneh, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ramli, Abdul Rahman

    Published 2014
    “…The results of analyzed evaluations through plots and statistical computations have demonstrated that this novel algorithm does not have the limitations of some popular voting algorithms such as median and weighted; moreover, it is able to significantly increase the reliability and availability of the system in the best case to 2489.7% and 626.74%, respectively, and in the worst case to 3.84% and 1.55%, respectively.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Implementation of Galerkin's method and modal analysis for unforced vibration response of a tractor suspension model by Shamshiri, Ramin, Wan Ismail, Wan Ishak

    Published 2014
    “…Galerkin’s method over the entire time domain was then employed to analyze the modal equation of motion for the unforced response. It was shown through calculations that the algorithm over entire time domain could not be generalized for computer implementation. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    A case study on quality of sleep and health using Bayesian networks by Hong , Choon Ong, Chiew , Seng Lee, Chye , Ching Sia

    Published 2012
    “…There are several phases involved including implementation of the learning algorithms, integration of prior knowledge through the whitelist argument and arc setting to form directed acyclic graphs. …”
    Get full text
    Article