Search Results - (( java implication based algorithm ) OR ( software generation gap algorithm ))

Refine Results
  1. 1
  2. 2

    Compiler-based prefetching algorithm for recursive data structure by Anuar, Nurulhaini

    Published 2007
    “…This best algorithm consists of greedy prefetching and prefetch array algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    A test case generation framework based on UML statechart diagram by Salman, Yasir Dawood

    Published 2018
    “…Unfortunately, existing studies in this domain are not sufficiently comprehensive in describing the major processes of the automated test case generation. Furthermore, the algorithms used for test case generation are not provided or well described. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Computing irreducible representations of two-generator groups by Sarmin, Nor Haniza, Robert F., Morse, Ahmad, Satapah, Ahmad, Azhana, Mohd. Ali, Nor Muhainiah

    Published 2009
    “…Groups, Algorithms and Programming (GAP) software has been used for the calculations. …”
    Get full text
    Monograph
  9. 9
  10. 10
  11. 11
  12. 12

    Development of dynamic programming algorithm for maintenance scheduling problem by Zafira Adlia, Mohd Fauzi

    Published 2020
    “…This research starts with reviewing the previous researches to find the gap in knowledge and find the possible solutions of the gap found. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Shallow-water mapping at Pantai Tok Jembal, Terengganu, Malaysia, using Lansat 8 (OLI) / Nur Syahirah Hashim by Hashim, Nur Syahirah

    Published 2021
    “…Open-source availability data with various types of sensors, the variety of simple to the sophisticated algorithm, and readily available software with a specialized image analysis tool are among the attractive options by Satellite-Derived Bathymetry (SDB). …”
    Get full text
    Get full text
    Thesis
  14. 14

    Generation of the batik Terengganu motifs using Bezier curve and Dejdumrong curve / Nuralea Natasya Amir Hamdan, Nur Fatin Natasya Ramdzan and Nurul Ain Nabila Mohamad Latif by Amir Hamdan, Nuralea Natasya, Ramdzan, Nur Fatin Natasya, Mohamad Latif, Nurul Ain Nabila

    Published 2023
    “…Based on this analysis, this study will develop a parametric model that allows for the generation of diverse motifs. To generate the motifs, the Bézier curve and Dejdumrong curve algorithms will be employed. …”
    Get full text
    Get full text
    Student Project
  15. 15
  16. 16
  17. 17

    Variable Neighborhood Descent and Whale Optimization Algorithm for Examination Timetabling Problems at Universiti Malaysia Sarawak by Emily Sing Kiang, Siew

    Published 2025
    “…The model employs a two-level structure, where the first level uses standard soft constraints as the objective function to evaluate solution quality, while the second level dynamically adapts to faculty-specific preferences. A constructive algorithm was developed to generate an initial feasible solution, which was subsequently refined using two primary approaches to evaluate their efficiency: Iterative Threshold Pipe Variable Neighborhood Descent (IT-PVND), and a modified Whale Optimization Algorithm (WOA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Transformer T-joint optimization using particle swarm optimization and hemisphere-shape design of the core by Yehya, Omar Sharaf Al-Deen

    Published 2017
    “…This technique was applied to design a new geometry of joint to get the minimum losses and to reduce the temperature in three-phase transformers. The smart algorithm proposed in this study presents the following advantages: (i) the correlation between the angles of the T-joint and gaps, (ii) the core loss profiles with temperature were considered, and (iii) the system was examined under different operational conditions. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…Finally, the implemented algorithm tested by comparing the accuracy of the current authentication framework with and without an EPSB algorithm. …”
    text::Thesis