Search Results - (( java implication based algorithm ) OR ( basic integration search algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1
  2. 2

    Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment by Nurul Atikah Janis

    Published 2018
    “…We demonstrate our framework; the integration of enhanced Jump Point Search algorithm with modified Bresenham for heuristic computation in virtual grid-based environment. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    African Buffalo Optimization Algorithm for Tuning Parameters of a PID Controller in Automatic Voltage Regulators by Odili, Julius Beneoluchi, M. N. M., Kahar, Noraziah, Ahmad

    Published 2016
    “…Though a recently-designed algorithm, the ABO has been effective and efficient in solving a number of search optimization problems. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Real time monitoring and controlling using Petri net algorithm for batch process plant / Mohamad Shaiful Osman by Osman, Mohamad Shaiful

    Published 2010
    “…This research is made for a system with fully integrated facilities for analyzing , monitoring and controlling of batch plant based on graph theory, batch modelling by means of Petri net algorithm and theory, control and configuration of SCADA system. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    African Buffalo Optimization Strategy for Tuning Parameters of a PID Controller in Automatic Voltage Regulators by Odili, Julius Beneoluchi, M. N. M., Kahar, Noraziah, Ahmad

    Published 2016
    “…Though a recently-designed algorithm, the ABO has been effective and efficient in solving a number of search optimization problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations by Jaafar, Abdullah Mohammed Abdo Ali

    Published 2011
    “…Many public-key cryptosystems are used in our daily lives to attain privacy, authenticity, integrity and non-repudiation. However, most of the existing public-key algorithms are based on complex mathematical computations. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Robotics in Education by Norashikin, M. Thamrin, Addie, Irawan, Zurita, Zulkifli, Syed Abdul Mutalib, Al Junid, Megat Syahirul Amin, Megat Ali, Anwar P. P., Abdul Majeed

    Published 2026
    “…The AI section discusses machine learning, path-planning algorithms (e.g., A* search, SLAM), and classroom case studies. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book
  10. 10

    A fuzzy case-based reasoning model for software requirements specifications quality assessment by Mostafa S.A., Gunasekaran S.S., Khaleefah S.H., Mustapha A., Jubair M.A., Hassan M.H.

    Published 2023
    “…Additionally, for efficient cases retrieval in the CBR, relevant cases selection and nearest cases selection heuristic search algorithms are used in the system. Basically, the input to the relevant cases algorithm is the available cases in the system case base and the output is the relevant cases. …”
    Article
  11. 11

    Heuristic resource allocation algorithm for controller placement in multi-control 5G based on SDN/NFV architecture by Ibrahim, Abeer Abdalla Zakaria, Hashim, Fazirulhisyam, Noordin, Nor Kamariah, Sali, Aduwati, Navaie, Keivan, Fadul, Saber Mohammed Elnour

    Published 2021
    “…It is based on the K-center problem, to solve the capacitated controller placement problem (CCPP), which acts as a resource location problem, in which the location and number of controllers can be allocated to maximize resources. A Greedy Randomized Search (GRS) algorithm was used to solve the dynamic assignment of nodes to controllers to achieve load balancing. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…The thesis also compares the results of enough images of various sizes generated by the proposed algorithms with the results of other fractal coding methods to confirm the algorithms’ clarity, reliability and validity. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A comparative analysis of machine learning approaches in sukuk price estimation across global regions by Islam, Gazi Taufiq, Malakar, Surajit, Hassan, Khondekar Lutful, Dey, Rajesh, Mahajan, Rupali A, Kassim, Salina

    Published 2024
    “…Future studies could explore comparative analyses of different machine learning algorithms, refine models for dynamic market conditions, and incorporate real-time data integration to enhance Sukuk price forecasting accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Abnormal event detection in video surveillance / Lim Mei Kuan by Lim, Mei Kuan

    Published 2014
    “…These low-level descriptions are then integrated using a basic set of rule-packages, to discriminate the different events. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Application of clustering in managing unstructured textual data in relational database / Wael Mohamed Shaher Yafooz by Yafooz, Wael Mohamed Shaher

    Published 2014
    “…Attempts have been made to resolve all of these issues by using several methods such as: full text searching, text indexing, a database schema management, database data model, and query-based techniques. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Prediction Of Antimicrobial Peptides Based On Sequence Alignment And Secondary Structure Sequence And Segment Sequence.pdf by Soh , Meng Wah

    Published 2015
    “…In this study, a new algorithm is proposed as a computational tool by integrating the sequence alignment method and the secondary structure sequence (SSS) and segment sequence (SS). …”
    Get full text
    Get full text
    Thesis