Search Results - (( program implementation among algorithm ) OR ( system implementation developing algorithm ))
Search alternatives:
- implementation developing »
- program implementation »
- system implementation »
- implementation among »
- among algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Enhancement of Ant System Algorithm for Course Timetabling Problem
Published 2009“…This research starts with developing an algorithm based on original concept of Ant System Algorithm. …”
Get full text
Get full text
Get full text
Thesis -
3
Designing and implementation of robot mapping algorithm for mobile robot
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
4
Examination invigilation timetable using Genetic Algorithm / Mohamad Fakhrullah Ibrahim
Published 2025“…To overcome these issues, a system utilizing a Genetic Algorithm (GA) was developed to automate and optimize the timetabling process. …”
Get full text
Get full text
Thesis -
5
Genetic Algorithm for vehicle routing problem / W.Nurfahizul Ifwah W.Alias, Mohd Shaiful Sharipudin and Shamsunarnie Mohamed Zukri.
Published 2012“…They are also robust and effective algorithms that are computationally simple and easy to implement.…”
Get full text
Get full text
Research Reports -
6
REDUCING LATENCY IN A VIRTUAL REALITY-BASED TRAINING APPLICATION
Published 2006“…Heuristic algorithm is an important module widely used for humanoid robots and avatars in VR systems. …”
Get full text
Get full text
Thesis -
7
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
8
Talent classification using support vector machine technique / Hamidah Jantan, Norazmah Mat Yusof and Mohd Hanapi Abdul Latif
Published 2014“…At the end, the aim of this study is to develop a prototype system using proposed classification model for talent forecasting. …”
Get full text
Get full text
Research Reports -
9
An event-driven simulation for highest urgency first (HUF) : a latency and modulation aware bandwidth allocation algorithm for WiMAX base stations.
Published 2013“…This research has focused at developing a discrete-event simulator to implement bandwidth allocation algorithms for a WiMAX base station.The highest urgency first algorithm has been utilized as a benchmark deployment algorithm in order to provide: dynamic downlink/uplink adjustment and latency guarantee for real-time applications. …”
Get full text
Get full text
Article -
10
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
Published 2017“…Furthermore, the system was developed using Fingerprint Matching Algorithm (FMA), Image Processing technique and embedded programming technique. …”
Get full text
Get full text
Thesis -
11
Fuzzy expert system to evaluate programming question / Norfarhana Syamiza Amir Sham
Published 2017“…Data to implement the FES system is the type level of control structure in programming question paper that contributes to the level of the question. …”
Get full text
Get full text
Thesis -
12
Application Of The Blockchain Technology Within Healthcare
Published 2021“…Finally, the constructed predictive model is implemented along with the proposed application, which connects all groups of participants with the blockchain-based EMR system.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Handheld devices 3D video streaming compression algorithm / Mohamad Taib Miskon, Hamidah Jantan and Wan Ahmad Khusairi Wan Chek
Published 2016“…In recent years, a Three Dimensional Discrete Cosine Transform (3D-DCT) coding algorithm has been developed for compression of still 3D integral images [8-10], The main benefit of using transform coding is that integral 3D images are inherently divided into small non-overlapping…”
Get full text
Get full text
Research Reports -
14
-
15
Computational intelligence based power system security assessment and improvement under multi-contingencies conditions / Nor Rul Hasma Abdullah
Published 2012“…The SVSJ was consequently used as the line outage severity indicator in the implementation of contingency analysis and ranking. The application of SVSI was extended for the evaluation of the constrained power planning (CPP) and Flexible AC Transmission Systems (FACTS) devices installation using Evolutionary Programming (EP) by considering multi-contingencies occurrence in the system. …”
Get full text
Get full text
Thesis -
16
Study on the microbial growth inhibition by using pineapple leaves juice
Published 2022“…The SVSJ was consequently used as the line outage severity indicator in the implementation of contingency analysis and ranking. The application of SVSI was extended for the evaluation of the constrained power planning (CPP) and Flexible AC Transmission Systems (FACTS) devices installation using Evolutionary Programming (EP) by considering multi-contingencies occurrence in the system. …”
Get full text
Get full text
Thesis -
17
-
18
Development of a Wireless PC-Controlled Mobile Robot System and Multimedia Based Learning Module
Published 2001“…The developed control algorithms enable the user to control the mobile robot manually, automatically or by voice recognition commands. …”
Get full text
Get full text
Thesis -
19
A study on obstacle detection for IoT based automated guided vehicle (AGV)
Published 2022“…In modern manufacturing industry context, Automated Guided Vehicles (AGVs) are mobile robots used in aiding the process of material handling from one point to a desired location in the workplace. Development on AGVs is a trending discussion among researchers due to its wide usage and the implementation of the Industrial 4.0. …”
Get full text
Get full text
Get full text
Article -
20
Computational intelligence based power system security assessment and improvement under multicontigencies conditions
Published 2012“…The minimizations of SVSJ and transmission loss are used as two separate objective functions for the development of optimization technique.The effect of reactive power load variation.on transmission loss in the system is also investigated.Consequently,the EP optimization technique is extended for the evaluation of the operating generator scheduling (OGS) to be applied on reactive power control in power system.The results obtained from the study can be used by the power system operators to make a decision either to achieve minimal SVSJ, minimal transmission loss or minimal installation cost.This has also avoided all generators to dispatch power at the same time.Finally,a novel multi-objective Constrained Reactive Power Control (CRPC) algorithm using the state-of-the-art of EP for voltage stability improvement has been developed.A performance comparison with Artificial Immune System (AIS) in terms of SVSJ and loss minimization was made and it is found that the proposed algorithm has been able to produce better results as compared to AIS.The contributions of the studies among the others are the development EP and AIS engine for CPP considered multi-contingencies (N-ni),the development of EP and AIS engine for FACTS installation considered multi-contingencies(N-m) for the determination of FACTS placement using SVSI and optimal sizing of FACTS using EP and AIS, the development of new technique for OGS based on EP optimization technique and the development of multi-objective EP and AIS engines for CRPC considered multi-contingencies (N-m).…”
Get full text
Get full text
Thesis
