Search Results - (( program implementation mix algorithm ) OR ( (java OR jaya) data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- program implementation »
- implementation mix »
- data normalization »
- mix algorithm »
-
1
Surveillance camera placement optimization using Particle Swarm Optimization (PSO) algorithm and Mixed-Integer Linear Programming (MILP) model / `Ain Safia Roslan
Published 2024“…This project explores the optimization of surveillance camera placements using Particle Swarm Optimization (PSO) and Mixed-Integer Linear Programming (MILP). PSO, inspired by the social behaviour of birds flocking or fish schooling, is a heuristic algorithm known for its flexibility and exploration capabilities. …”
Get full text
Get full text
Thesis -
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
3
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
4
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…AES in this research was implemented using 128- bit of key length and block size. …”
Get full text
Get full text
Thesis -
5
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
6
-
7
Counting roots of the Polynomial systems by using mixed volume of the Newton polytopes / Nur Suhailah Norazhar, Nur Ain Sofiya Zainuri and Nor Suhada Mohd Rosdi
Published 2024“…The results from the Maple program are compared to confirm the root counting result using the mixed volume method. …”
Get full text
Get full text
Student Project -
8
Estimation of air pollutant index (API) of Klang valley using artificial neural network (ANN) / Roshaslinie Amdam @ Ramli
“…This method uses the past raw data values to estimate the API. The data collected comprises of data for the previous three month, beginning from October 2006 for Klang Valley areas which are Shah Alam, Klang, Petaling Jaya and Kuala Lumpur. …”
Get full text
Get full text
Article -
9
Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems
Published 2018“…A mixed integer programming models are formulated to represent the objectives. …”
Get full text
Get full text
Thesis -
10
Reverse logistics network optimizing by genetic algorithm: a case study of automotive wiring harnesses
Published 2014“…With regards to the complexity of the reverse logistics network, traditional method cannot be implemented for solving them. Thus, an evolutionary algorithm based genetic algorithm (GA) is applied as a solution methodology to solve mixed integer linear programming model and find the optimum solution. …”
Get full text
Get full text
Get full text
Article -
11
Estimation of air pollutant index (API) in Klang valley using artificial neural network (ANN) / Roshaslinie Amdam @ Ramli
Published 2009“…This method uses the past raw data values to estimate the API. The data collected comprises of data for the previous three month, beginning from October 2006 for Klang Valley areas which are Shah Alam, Klang, Petaling Jaya and Kuala Lumpur. …”
Get full text
Get full text
Thesis -
12
-
13
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004“…Both Design I and Design 2 were written using VHDL, simulated using ALDEC, synthesized using XILINX Synthesizing Tools, implemented using XILINX ISE6.2i implementation tools and download onto the Spartan 2 FPGA board using BEDLOAD utility program. …”
Get full text
Get full text
Final Year Project -
14
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
15
Optimization Of Twofish Encryption Algorithm On FPGA
Published 2005“…Both Design I and Design 2 were written using VHDL, simulated using ALDEC, synthesized using XILINX Synthesizing Tools, implemented using XILINX ISE6.2i implementation tools and download onto the Spartan 2 FPGA board using BEDLOAD utility program. …”
Get full text
Conference or Workshop Item -
16
-
17
-
18
Solving a multi-period inventory routing problem with stochastic unstationary demand rates
Published 2022“…The computational results show that the algorithms that implement this modified formulation can achieve a better optimization result. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong
Published 2018“…The computational results show that the algorithms which implement this new formulation are able to produce better solutions. …”
Get full text
Get full text
Get full text
Thesis -
20
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis
