Search Results - (( program evaluation techniques algorithm ) OR ( java implementation during algorithm ))

Refine Results
  1. 1

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…While much research has been conducted, focusing on the development of algorithms and techniques for HAR, less emphasis was placed on the improvement of HAR research’s efficiency in terms of sensor data collection, annotation, and storage, resulting in the use of incomplete, inefficient, and time-consuming data engineering systems. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…To improve the rate of fault detection during several TCP approaches are proposed for regression testing. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5

    Linear array beampattern gain optimization techniques by Nagi F.

    Published 2023
    “…The comparison between the two techniques reveals that in general the goal programming algorithm perform better in terms of the SNR of the beampattern beamwidths. � 2001 IEEE.…”
    Conference paper
  6. 6

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…The maximum and minimum accuracy obtained is 99% and 96% respectively, based on the evaluation approach. The most commonly used evaluation technique is called k-cross validation technique. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10

    Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming by Hussien, Hassan Mansur, Md Yasin, Sharifah, Muda, Zaiton, Udzir, Nur Izura

    Published 2019
    “…In point of fact, it is significant to produce a security evaluation of block cipher algorithms to determine a statistical non-random behavior of attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Various CPS techniques have been proposed such as PAC, IPO, Flowchart and Algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Integration of program evaluation and review technique (PERT), gantt chart and genetic algorithm in project management scheduling by Ahmad, Siti Hasziani

    Published 2014
    “…In this thesis, the discussion on the integration approach, which combines Program Evaluation and Review Technique (PERT), Gantt Chart (GC) and Genetic Algorithm (GA), is carried out. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    LCSS-Based Algorithm for Computing Multivariate Data Set Similarity: A Case Study of Real-Time WSN Data by Khan, Rahim, Ali, Ihsan, Altowaijri, Saleh, Zakarya, Muhammad, Rahman, Atiq Ur, Ahmedy, Ismail, Khan, Anwar, Gani, Abdullah

    Published 2019
    “…Several non-metric-based algorithms are available in the literature, the most robust and reliable one is the dynamic programming-based technique. …”
    Get full text
    Get full text
    Article
  15. 15

    Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat by Minhat, Abdul Rahman

    Published 2008
    “…This thesis presents the Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission system. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Comparison Between Linear Programming And Integer Linear Programming: A Review by Sam, Mei Lee, Saptari, Adi, Salleh, Mohd Rizal, Mohamad, Effendi

    Published 2018
    “…For ILP, available algorithms can be classified into exact algorithms and heuristic algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Optimizing tree planting areas through integer programming and improved genetic algorithm by Md Badarudin, Ismadi

    Published 2012
    “…Therefore, a hybrid algorithm through an incorporation of Integer Programming and Improved Genetic Algorithm was proposed for planting lining design. …”
    Get full text
    Get full text
    Thesis
  20. 20