Search Results - (( program packaging methods algorithm ) OR ( java location based algorithm ))

Search alternatives:

Refine Results
  1. 1
  2. 2
  3. 3

    Group formation using genetic algorithm by Che Ani, Zhamri, Husin, Mohd Zabidin, Yasin, Azman

    Published 2009
    “…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  4. 4

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Mould Filling In Electronic Packaging by Heng, Chai Wei

    Published 2005
    “…Characteristic Based Split (CBS) method is utilized in this program to analyze and model the fluid flow in a single cavity mold of the encapsulation process. …”
    Get full text
    Get full text
    Monograph
  6. 6
  7. 7

    Progressive damage analysis of composite layered plates using a mesh reduction method by Zahari, Rizal, El Zafrany, Ahmed

    Published 2006
    “…A progressive damage methodology and algorithm for composite laminates was successfully developed for the new finite strip methods using stress-based failure criteria. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Path planning algorithm for a car like robot based on MILP method by Mohd Sadri, Mohd Pawzi

    Published 2013
    “…This has been combined with collision avoidance constraints to form a mixed integer linear program, which can be solved by a commercial software package.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Comparison Of Phylogenetic Trees Using Difference Distance Function Method by Maziah, Medin

    Published 2005
    “…The phylogenetic tree is build using the PHYLlP (the PHYlogeny Inference Package), a package of programs for inferring phylogenies (evolutionary trees). …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  10. 10

    A study on solution of matrix riccati differential equations using ant colony programming and simulink / Mohd Zahurin Mohamed Kamali by Mohamed Kamali, Mohd Zahurin

    Published 2015
    “…In this thesis, we implement the modified ant colony programming (ACP) algorithm for solving the matrix Riccati differential equation (MRDE). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Statistical approach on grading: mixture modeling by Md. Desa, Zairul Nor Deana

    Published 2006
    “…A solution to this problem is using the Markov Chain Monte Carlo method namely Gibbs sampler algorithm. The Gibbs sampler algorithm is applied using the WinBUGS programming package. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  14. 14

    The use of Cox regression and genetic algorithm (CoRGA) for identifying risk factors for mortality in older people by Ahmad, Rabiah, Bath, Peter A

    Published 2004
    “…This is partly because traditional statistical methods and software packages allow a restricted number of variables and combinations of variables. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Network reconfiguration and control for loss reduction using genetic algorithm by Jawad, Mohamed Hassan Izzaldeen

    Published 2010
    “…Two methods of load flow solution with different accuracy are employed, i.e., simplified method, which uses the approximation of P and Q at the start of the implemented program, and fast-decoupled method, which gives an exact solution. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Parallel Implementation Of Field Visualizations With High Order Tetrahedral Finite Elements by Ishak, Mohammad Hafifi Hafiz

    Published 2013
    “…The method builds upon an approach of the open source visualization software VTK where the data visualizer program ParaView is freely available. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Progressive failure analysis of composite laminated stiffened plates using the finite strip method by Zahari, Rizal, El-Zafrany, Ali M.

    Published 2009
    “…A progressive failure algorithm for composite laminates has been successfully developed for the new finite strip methods using a stress-based failure criterion, Tsai–Wu. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks by Adday, Ghaihab Hassan, Subramaniam, Shamala K., Zukarnain, Zuriati Ahmad, Samian, Normalia

    Published 2023
    “…The second stage will validate the voting process through a novel perspective based on the TMS. TMS will check the voters’ replies based on the event’s location. …”
    Get full text
    Get full text
    Article
  19. 19

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  20. 20