Search Results - (( program implementation among algorithm ) OR ( system implementation developing algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Enhancement of Ant System Algorithm for Course Timetabling Problem by Djamarus, Djasli

    Published 2009
    “…This research starts with developing an algorithm based on original concept of Ant System Algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Examination invigilation timetable using Genetic Algorithm / Mohamad Fakhrullah Ibrahim by Ibrahim, Mohamad Fakhrullah

    Published 2025
    “…To overcome these issues, a system utilizing a Genetic Algorithm (GA) was developed to automate and optimize the timetabling process. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    REDUCING LATENCY IN A VIRTUAL REALITY-BASED TRAINING APPLICATION by P ISKANDAR, YULITA HANUM

    Published 2006
    “…Heuristic algorithm is an important module widely used for humanoid robots and avatars in VR systems. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Talent classification using support vector machine technique / Hamidah Jantan, Norazmah Mat Yusof and Mohd Hanapi Abdul Latif by Jantan, Hamidah, Mat Yusof, Norazmah, Abdul Latif, Mohd Hanapi

    Published 2014
    “…At the end, the aim of this study is to develop a prototype system using proposed classification model for talent forecasting. …”
    Get full text
    Get full text
    Research Reports
  9. 9

    An event-driven simulation for highest urgency first (HUF) : a latency and modulation aware bandwidth allocation algorithm for WiMAX base stations. by Naghshbandi, Danial, Subramaniam, Shamala, Moghadam, Saeed Rahimi

    Published 2013
    “…This research has focused at developing a discrete-event simulator to implement bandwidth allocation algorithms for a WiMAX base station.The highest urgency first algorithm has been utilized as a benchmark deployment algorithm in order to provide: dynamic downlink/uplink adjustment and latency guarantee for real-time applications. …”
    Get full text
    Get full text
    Article
  10. 10

    Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri by ‘Asri, Nur Nadia Syahirah

    Published 2017
    “…Furthermore, the system was developed using Fingerprint Matching Algorithm (FMA), Image Processing technique and embedded programming technique. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Fuzzy expert system to evaluate programming question / Norfarhana Syamiza Amir Sham by Amir Sham, Norfarhana Syamiza

    Published 2017
    “…Data to implement the FES system is the type level of control structure in programming question paper that contributes to the level of the question. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Application Of The Blockchain Technology Within Healthcare by Lin, Michelle Hwei Yee

    Published 2021
    “…Finally, the constructed predictive model is implemented along with the proposed application, which connects all groups of participants with the blockchain-based EMR system.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Handheld devices 3D video streaming compression algorithm / Mohamad Taib Miskon, Hamidah Jantan and Wan Ahmad Khusairi Wan Chek by Miskon, Mohamad Taib, Jantan, Hamidah, Wan Chek, Wan Ahmad Khusairi

    Published 2016
    “…In recent years, a Three Dimensional Discrete Cosine Transform (3D-DCT) coding algorithm has been developed for compression of still 3D integral images [8-10], The main benefit of using transform coding is that integral 3D images are inherently divided into small non-overlapping…”
    Get full text
    Get full text
    Research Reports
  14. 14
  15. 15

    Computational intelligence based power system security assessment and improvement under multi-contingencies conditions / Nor Rul Hasma Abdullah by Abdullah, Nor Rul Hasma

    Published 2012
    “…The SVSJ was consequently used as the line outage severity indicator in the implementation of contingency analysis and ranking. The application of SVSI was extended for the evaluation of the constrained power planning (CPP) and Flexible AC Transmission Systems (FACTS) devices installation using Evolutionary Programming (EP) by considering multi-contingencies occurrence in the system. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Study on the microbial growth inhibition by using pineapple leaves juice by Amirah, Ya'acob

    Published 2022
    “…The SVSJ was consequently used as the line outage severity indicator in the implementation of contingency analysis and ranking. The application of SVSI was extended for the evaluation of the constrained power planning (CPP) and Flexible AC Transmission Systems (FACTS) devices installation using Evolutionary Programming (EP) by considering multi-contingencies occurrence in the system. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Development of a Wireless PC-Controlled Mobile Robot System and Multimedia Based Learning Module by Mujber, Tariq Saad

    Published 2001
    “…The developed control algorithms enable the user to control the mobile robot manually, automatically or by voice recognition commands. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A study on obstacle detection for IoT based automated guided vehicle (AGV) by Loh, Jit Hao, M. Nafis, O. Z.

    Published 2022
    “…In modern manufacturing industry context, Automated Guided Vehicles (AGVs) are mobile robots used in aiding the process of material handling from one point to a desired location in the workplace. Development on AGVs is a trending discussion among researchers due to its wide usage and the implementation of the Industrial 4.0. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Computational intelligence based power system security assessment and improvement under multicontigencies conditions by Nor Rul Hasma, Abdullah

    Published 2012
    “…The minimizations of SVSJ and transmission loss are used as two separate objective functions for the development of optimization technique.The effect of reactive power load variation.on transmission loss in the system is also investigated.Consequently,the EP optimization technique is extended for the evaluation of the operating generator scheduling (OGS) to be applied on reactive power control in power system.The results obtained from the study can be used by the power system operators to make a decision either to achieve minimal SVSJ, minimal transmission loss or minimal installation cost.This has also avoided all generators to dispatch power at the same time.Finally,a novel multi-objective Constrained Reactive Power Control (CRPC) algorithm using the state-of-the-art of EP for voltage stability improvement has been developed.A performance comparison with Artificial Immune System (AIS) in terms of SVSJ and loss minimization was made and it is found that the proposed algorithm has been able to produce better results as compared to AIS.The contributions of the studies among the others are the development EP and AIS engine for CPP considered multi-contingencies (N-ni),the development of EP and AIS engine for FACTS installation considered multi-contingencies(N-m) for the determination of FACTS placement using SVSI and optimal sizing of FACTS using EP and AIS, the development of new technique for OGS based on EP optimization technique and the development of multi-objective EP and AIS engines for CRPC considered multi-contingencies (N-m).…”
    Get full text
    Get full text
    Thesis