Search Results - (( program implementation during algorithm ) OR ( using visual basic algorithm ))

Refine Results
  1. 1

    The implementation of post-processing data thinning for multibeam echo sounding data by Mahmud, Mohd. Razali, Mohd. Yusof, Othman

    Published 2006
    “…This paper elaborates on the development of data thinning programs using Microsoft Visual Basic Version 6. Various algorithms namely Douglas Peucker, Single Swathe Reducer and Skip N Points are referred. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Investigating computational thinking among primary school students in Terengganu using visual programming by Osmanullrazi, Abdullah

    Published 2022
    “…Recent studies have shown that visual programming is one of the efficient tools to develop CT skills. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Using Electromagnetism-like algorithm and genetic algorithm to optimize time of task scheduling for dual manipulators by Abed I.A., Sahari K.S.M., Koh S.P., Tiong S.K., Jagadeesh P.

    Published 2023
    “…The movement and the configurations of the manipulators at the task points were visualized using a simulator developed via Visual Basic. …”
    Conference paper
  5. 5
  6. 6

    Design Of Robot Motion Planning Algorithm For Wall Following Robot by Ali Hassan, Muhamad Khairul

    Published 2006
    “…A user friendly GUI is developed using VISUAL BASIC to interface the user commands with the Robot controller. …”
    Get full text
    Get full text
    Monograph
  7. 7

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Development of dynamic programming algorithm for maintenance scheduling problem by Zafira Adlia, Mohd Fauzi

    Published 2020
    “…Then, the data of the maintenance team from one of the utilities provider company in Malaysia was collected to be implemented in the development of a dynamic programming algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Thalassaemia detection using CBR Algorithm via mobile device by Nur Faezah, Omar

    Published 2011
    “…Moreover,this application will be using the programming language Visual Basic. Net applied in Visual Studio 2008.The methodology has chosen is rapid application development (RAD) where this method is the archive with apparel search requirement. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    Thalassaemia detection using CBR Algorithm via mobile device by Nur Faezah, Omar

    Published 2011
    “…Moreover,this application will be using the programming language Visual Basic. Net applied in Visual Studio 2008.The methodology has chosen is rapid application development (RAD) where this method is the archive with apparel search requirement. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension by Affandy

    Published 2015
    “…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    A multi-depot vehicle routing problem with stochastic road capacity and reduced two-stage stochastic integer linear programming models for rollout algorithm by Anuar, Wadi Khalid, Lee, Lai Soon, Seow, Hsin Vonn, Pickl, Stefan

    Published 2021
    “…A matheuristic approach based on a reduced two-stage Stochastic Integer Linear Programming (SILP) model is presented. The proposed approach is suitable for obtaining a policy constructed dynamically on the go during the rollout algorithm. …”
    Get full text
    Get full text
    Article
  13. 13

    Particle swarm optimization (PSO) for CNC route problem by Nur Azia Azwani, Ismail

    Published 2002
    “…The algorithm used in this project is the Global Best (gbest) algorithm where it is a basic algorithm of Particle Swarm Optimization which applicable the shortest time and path of CNC machine to complete the process of drilling. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    A new meta heuristic evolutionary programming (NMEP) in optimizing economic energy dispatch by Mohamad Ridzuan, Mohamad Radzi, Hassan, Elia Erwani, Abdullah, Abdul Rahim, Bahaman, Nazrulazhar, Abdul Kadir, Aida Fazliana

    Published 2016
    “…The proposed optimization algorithm, namely New Meta-Heuristic Evolutionary Programming (NMEP) algorithm is followed to Meta-Heuristic Evolutionary Programming (Meta-EP) approach with some modification where the cloning process embedded as a significant progress during the implementation. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    VISUAL MOUSE (COLOR TRACKING) by BAHRUDIN, MUHAMMADMUSTAFA

    Published 2007
    “…The basic principle of this project would be distinguishing color and use its properties to move a cursor in MATLAB and draw as well.…”
    Get full text
    Get full text
    Final Year Project
  16. 16
  17. 17
  18. 18

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…This system is achieved using the Genetic Algorithm which is capable of performing information retrieval and learning algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Ciphercrypt-an Encryption System / Nor Hidayah Ngah by Nor Hidayah, Ngah

    Published 2004
    “…This system is implemented on a Windows platform with Visual Basic as a programming language and 3-DES as a main encryption algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations by Jaafar, Abdullah Mohammed Abdo Ali

    Published 2011
    “…The basic design of visual cryptography exploits the human visual system, to recover secret images. …”
    Get full text
    Get full text
    Thesis