Search Results - (( process implementation among algorithm ) OR ( java application force algorithm ))

Refine Results
  1. 1

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  2. 2

    A permutation parallel algorithm under exchange restriction with message passing interface by Karim, Sharmila, Omar, Zurni, Ibrahim, Haslinda

    Published 2014
    “…However permutation generation is time consuming process, the implementation of sequential algorithm to parallel computation is the option for reducing the computation time. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Real time monitoring and controlling using Petri net algorithm for batch process plant / Mohamad Shaiful Osman by Osman, Mohamad Shaiful

    Published 2010
    “…This thesis searches the basic concepts and uses of the classical method Petri net algorithm in SCADA system to control and monitoring the process plant. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Enhanced gravitational search algorithm for nano-process parameter optimization problem / Norlina Mohd Sabri by Mohd Sabri, Norlina

    Published 2020
    “…The analysis on the processing times has also shown that eGSA has been able to reduce its processing time compared to GSA and most of other algorithms. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Parallel genetic algorithms for shortest path routing in high- performance computing / Mohd Erman Safawie Che Ibrahim by Che Ibrahim, Mohd Erman Safawie

    Published 2012
    “…This project focuses on step-up cluster computing and a parallel Genetic Algorithm. The objectives of this project to set-up Beowulf cluster computer to apply the Travelling Salesman Problem in parallel by using Genetic Algorithms and evaluate sequential algorithms and parallel algorithms by Genetic Algorithms. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Voting algorithms for large scale fault-tolerant systems by Karimi, Abbas

    Published 2011
    “…In addition to having all the features of sequential algorithm, this algorithm has far less time complexity and has higher processing speed in voting process in large scale systems. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  8. 8

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
    Review
  9. 9
  10. 10

    Examination invigilation timetable using Genetic Algorithm / Mohamad Fakhrullah Ibrahim by Ibrahim, Mohamad Fakhrullah

    Published 2025
    “…To overcome these issues, a system utilizing a Genetic Algorithm (GA) was developed to automate and optimize the timetabling process. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Static and self-scalable filter range selection algorithms for peer-to-peer networks by Kweh, Yeah Lun

    Published 2011
    “…The research works were implemented by simulation in which it was used to identify the selection problem, implementation of the proposed algorithms and the measurement of the results. …”
    Get full text
    Get full text
    Thesis
  12. 12

    New perturb and observe algorithm based on trapezoidal rule: uniform and partial shading conditions by Mahmod Mohammad Altwallbah, Neda, Mohd Radzi, Mohd Amran, Azis, Norhafiz, Shafie, Suhaidi, Mohd Zainuri, Muhammad Ammirrul Atiqi

    Published 2022
    “…The new algorithm allows the search to continue until the extremum maximum is identified among numerous local maximums, rather than being imprisoned at one of the local maximums as is the case with the standard algorithm. …”
    Get full text
    Get full text
    Article
  13. 13

    Talent classification using support vector machine technique / Hamidah Jantan, Norazmah Mat Yusof and Mohd Hanapi Abdul Latif by Jantan, Hamidah, Mat Yusof, Norazmah, Abdul Latif, Mohd Hanapi

    Published 2014
    “…Support Vector Machine (SVM) is among the popular learning algorithm for classification in soft computing techniques. …”
    Get full text
    Get full text
    Research Reports
  14. 14

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17
  18. 18

    Optimization of k-Nearest Neighbour to categorize Indonesian’s news articles by Ihsan, Afdhalul, Rainarli, Ednawati

    Published 2021
    “…Aghdam's research shows that PSO is the best among those methods. This study examined PSO to optimize the k-Nearest Neighbour (k-NN) algorithm's performance in categorizing news articles. k-NN is an algorithm that is simple and easy to implement. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A modified watershed segmentation algorithm for automated lung cancer lesion detection in CT scan images / Nur Najihah Sofia Mohd Marzuki by Mohd Marzuki, Nur Najihah Sofia

    Published 2024
    “…Lung cancer is one of the leading cancers among both men and women and ranks among the most dangerous and life-threatening diseases worldwide. …”
    Get full text
    Get full text
    Thesis