Search Results - (( program among modified algorithm ) OR ( java application path algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Hybrid meta-heuristic algorithm for solving multi-objective aggregate production planning in fuzzy environment by Kalaf, Kalaf, Bayda Atiya

    Published 2017
    “…For these proposed approaches, this study adopted a hybridization of a fuzzy programming, modify simulated annealing, and simplex downhill (SD) algorithm called Fuzzy-MSASD to resolve multiple objective linear programming APP problems in a fuzzy environment. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong by Lily , Wong

    Published 2018
    “…The sensitivity analysis on important parameters that influence decision policy in ACO in order to choose the appropriate parameter settings is carried out. Among the two proposed algorithms, that is, ACO and ACO2, ACO2 outperform than ACO. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Solving the integrated inventory supply chain problems using meta-heuristic methods / Seyed Mohsen Mousavi by Seyed Mohsen , Mousavi

    Published 2018
    “…A Modified Particle Swarm Optimization (MPSO) algorithm, a Genetic Algorithm (GA), a modified fruit fly optimization algorithm (MFOA) and a simulated annealing (SA) algorithm were used to find the optimal solution. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA by DORE RAJA, ANAND A RAJA

    Published 2004
    “…The demand for efficient and secure ciphers has given rise to a new generation of block ciphers capable of providing increased protection at lower cost. Among these new algorithms is Twofish. Twofish is a promising 128-bit block which was one of the 5 finalists in the National Institute of Standards and Technology organized competition as the Advanced Encryption Standard. …”
    Get full text
    Get full text
    Final Year Project
  10. 10
  11. 11

    Discrete-event simulation for outpatient flow and emergency patient arrival in a haemodialysis unit by A., Sundar, N. A. A., Rahmin, C. Y., Chen, M. A., Nazihah

    Published 2023
    “…Discrete-event simulation is used to estimate the outpatients flow based on the mean arrival rate, ». A modified integer linear programming model is presented in this paper which highlighted on the patients arrival time, patients departure time and bed availability for emergency case. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Optimization Of Twofish Encryption Algorithm On FPGA by Raja, Ananda Raja Dore, Zain Ali, Noohul Basheer, Hussin, Fawnizu Azmadi

    Published 2005
    “…The demand for efficient and secure ciphers has given rise to a new generation of block ciphers capable of providing increased protection at lower cost. Among these new algorithms is Twofish. Twofish is a promising 128-bit block which was one of the 5 finalists in the National Institute of Standards and Technology organized competition as the Advanced Encryption Standard. …”
    Get full text
    Conference or Workshop Item
  13. 13

    Handwriting recognition using webcam for data entry by Xiang, W.Y., Sebastian, P.

    Published 2015
    “…The modules have its distinct characteristics which is trained using the Back-Propagation algorithm to cluster the pattern recognition capabilities among different samples of handwriting. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Modified strut-and-tie models for reinforced concrete deep beams with externally bonded CFRP systems by Hanoon, Ammar Nasiri

    Published 2017
    “…Thus, the objective of this study is to modify the STM to analyse concrete deep beams for the two cases. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Handwriting recognition using webcam for data entry by Wong , Yoong Xiang

    Published 2014
    “…The modules have its distinct characteristics which is trained using the Back-Propagation algorithm to cluster the pattern recognition capabilities among different samples of handwriting. …”
    Get full text
    Get full text
    Final Year Project
  16. 16
  17. 17