Search Results - (( program among modified algorithm ) OR ( java application optimisation algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Hybrid meta-heuristic algorithm for solving multi-objective aggregate production planning in fuzzy environment by Kalaf, Kalaf, Bayda Atiya

    Published 2017
    “…For these proposed approaches, this study adopted a hybridization of a fuzzy programming, modify simulated annealing, and simplex downhill (SD) algorithm called Fuzzy-MSASD to resolve multiple objective linear programming APP problems in a fuzzy environment. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  5. 5

    Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong by Lily , Wong

    Published 2018
    “…The sensitivity analysis on important parameters that influence decision policy in ACO in order to choose the appropriate parameter settings is carried out. Among the two proposed algorithms, that is, ACO and ACO2, ACO2 outperform than ACO. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Solving the integrated inventory supply chain problems using meta-heuristic methods / Seyed Mohsen Mousavi by Seyed Mohsen , Mousavi

    Published 2018
    “…A Modified Particle Swarm Optimization (MPSO) algorithm, a Genetic Algorithm (GA), a modified fruit fly optimization algorithm (MFOA) and a simulated annealing (SA) algorithm were used to find the optimal solution. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA by DORE RAJA, ANAND A RAJA

    Published 2004
    “…The demand for efficient and secure ciphers has given rise to a new generation of block ciphers capable of providing increased protection at lower cost. Among these new algorithms is Twofish. Twofish is a promising 128-bit block which was one of the 5 finalists in the National Institute of Standards and Technology organized competition as the Advanced Encryption Standard. …”
    Get full text
    Get full text
    Final Year Project
  10. 10
  11. 11

    Discrete-event simulation for outpatient flow and emergency patient arrival in a haemodialysis unit by A., Sundar, N. A. A., Rahmin, C. Y., Chen, M. A., Nazihah

    Published 2023
    “…Discrete-event simulation is used to estimate the outpatients flow based on the mean arrival rate, ». A modified integer linear programming model is presented in this paper which highlighted on the patients arrival time, patients departure time and bed availability for emergency case. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Optimization Of Twofish Encryption Algorithm On FPGA by Raja, Ananda Raja Dore, Zain Ali, Noohul Basheer, Hussin, Fawnizu Azmadi

    Published 2005
    “…The demand for efficient and secure ciphers has given rise to a new generation of block ciphers capable of providing increased protection at lower cost. Among these new algorithms is Twofish. Twofish is a promising 128-bit block which was one of the 5 finalists in the National Institute of Standards and Technology organized competition as the Advanced Encryption Standard. …”
    Get full text
    Conference or Workshop Item
  13. 13

    Handwriting recognition using webcam for data entry by Xiang, W.Y., Sebastian, P.

    Published 2015
    “…The modules have its distinct characteristics which is trained using the Back-Propagation algorithm to cluster the pattern recognition capabilities among different samples of handwriting. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Modified strut-and-tie models for reinforced concrete deep beams with externally bonded CFRP systems by Hanoon, Ammar Nasiri

    Published 2017
    “…Thus, the objective of this study is to modify the STM to analyse concrete deep beams for the two cases. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Handwriting recognition using webcam for data entry by Wong , Yoong Xiang

    Published 2014
    “…The modules have its distinct characteristics which is trained using the Back-Propagation algorithm to cluster the pattern recognition capabilities among different samples of handwriting. …”
    Get full text
    Get full text
    Final Year Project
  16. 16
  17. 17