Search Results - (( java interaction efficient algorithm ) OR ( program implementation action algorithm ))

Refine Results
  1. 1

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…It should be an interesting, time and value worth topic to research on. By using Java applet, it will give a good interactive response since it does not suffer from the delays or variability of bandwidth associated with network connection. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof by Yusof, Yusman

    Published 2019
    “…In the algorithm development a step-by-step example of the algorithm implementation is presented and then successfully implemented in Lego Mindstorm obstacle avoiding mobile robot as a proof of concept implementation of the hybrid AI algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Input-output based relation combinatorial testing using whale optimization algorithm for generating near optimum number of test suite by Suali, Anjila J., Nuraminah Ramli, Rozmie Razif Othman, Hasneeza Liza Zakaria, Iszaidy Ismail, Nor Shahida Mohd Jamail, Rimuljo Hendradi, Nurol Husna Che Rose

    Published 2025
    “…Given the impracticality of testing every possible interaction due to time, budget, and resource constraints, combinatorial testing, which is t-way testing, is adopted to cover parameter interactions efficiently. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    A DC motor controller using PID algorithm implementation on PIC by Wan Robaah, W Ahmad

    Published 2008
    “…Then, a PIC microcontroller is programmed by adding the value of tuned PID algorithm to control the speed of DC servo motor. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5
  6. 6
  7. 7

    Modular motor driver with torque control for gripping mechanism by How D.N.T., Baharuddin M.Z., Mohideen S.S.K., Sahari K.S.M., Anuar A.

    Published 2023
    “…In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
    Conference paper
  8. 8

    A network based fetal ECG monitoring algorithm by Ibrahimy, Muhammad Ibn, Hasan , M. A., Motakabber, S. M. A.

    Published 2011
    “…The AECG signal is processed into the remote computer terminal and finally extracts the FECG signal by the FHR monitoring program. The networking program is developed by a client/server approach and it can transport the AECG data file as well as online chatting facility. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…Each web services are easily maintainable since there is loose coupling between interacting nodes. The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Application Of The Blockchain Technology Within Healthcare by Lin, Michelle Hwei Yee

    Published 2021
    “…There are four proposed algorithms based on the actions of viewing and writing EMR, as well as another two additional actions aimed at improving the security of the blockchain framework. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Network monopoly / Tan Kean Yeap by Tan , Kean Yeap

    Published 2002
    “…The main aspect of this thesis is to produce a network monopoly system, which process multiple game sessions concurrently, enabling users to play the graphical game with people within the network. The algorithm design and implementation method mustnot only be workable, but also highly efficient in terms of execution speed and respond time. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Deep Reinforcement Learning For Control by Bakar, Nurul Asyikin Abu

    Published 2021
    “…To generate the visual simulation in the simulator, the Python programming language is employed. The improved algorithm will help encourage the real-world implementation of DRL in many autonomous driving applications.…”
    Get full text
    Get full text
    Monograph
  13. 13

    Hybridization solution of electrical energy demand response and forecasting program by using PSO-LSSVM technique by Ali, Amira Noor Farhanie, Sulaima, Mohamad Fani, Tahir, Musthafah Mohd., Razak, Intan Azmira Wan Abdul, Kadir, Aida Fazliana Abdul, Rahman, Zulkifli Ab.

    Published 2023
    “…To overcome this challenge, a demand-side management (DSM) approach is put into action, which involves the use of DR schemes and diverse action strategies. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Fault detection and diagnosis using rule-based support system on fatty acid fractionation column by Yann, H. H., Ali, Mohamad Wijayanuddin, Kamsah, Mohd Zaki

    Published 2003
    “…Identification of causes, consequences and suggested actions for each deviation assisted by Hazard and Operability Study (HAZOP) analysis are generated into rule-based algorithm. …”
    Get full text
    Get full text
    Article
  15. 15

    Encryption Technology on Windows Workstation by Amdan, Zulkhaimi

    Published 2004
    “…This is achieved by trying to combine several techniques of securing and strengthening the RSA algorithm. One of the techniques that will be looked into is 'knocking', where the authorized users will have to perform a series of predetermined actions to validate their requests for the information in addition of the public key they have. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Development of mobile application of event assistant and booking sport facilities for UiTM Seremban 3 Campus using wofkflow management system / Ahmad Haiqal Abd Halim, Ahmad Yusuf... by Abd Halim, Ahmad Haiqal, Che Hassan, Ahmad Yusuf, Hambari, Mohd Norhafizi

    Published 2019
    “…In this research, its content of the step on how to apply the method of WfMS in a mobile application with the use of an android studio. The algorithm for the WfMS is written using Java script in this research. …”
    Get full text
    Get full text
    Student Project
  17. 17
  18. 18

    Power system intentional islanding for different contingency scenarios using discrete optimization technique by Nur Zawani Binti Saharuddin

    Published 2023
    “…Intentional islanding is one of the remedial actions that can be implemented to prevent severe cascading failures following a critical line outage. …”
    text::Thesis
  19. 19
  20. 20

    Design and development of iRemote Terminal Unit (iRTU) for undervoltage and overvoltage fault by Wan Nor Shela Ezwane, Wan Jusoh

    Published 2014
    “…Therefore, the design and development of the iRTU is implemented to ensure the problem of power outages can be detected immediately and the TNB can take action quickly. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis