Search Results - (( program purpose based algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    A Constraint Programming-based Genetic Algorithm (CPGA) for Capacity Output Optimization by Ean, Kate Nee Goh, Jeng, Feng Chin, Wei, Ping Loh, Chea, Ling Tan

    Published 2014
    “…Purpose: The manuscript presents an investigation into a constraint programming-based genetic algorithm for capacity output optimization in a back-end semiconductor manufacturing company. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Therefore, utilizing the agent-based featured agents for this purpose is a benefit with the aim of helping novice programmers to understand the CPS without knowing the programming language. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Drone Based People Counter And Tracking Using Unique Id Using Opencv Python by Bhaskar, Hariyaran

    Published 2020
    “…The purpose of this thesis is to implement an algorithm for drone-based square boundaries using Python and OpenCV. …”
    Get full text
    Get full text
    Monograph
  4. 4

    Software Classification Using Structure-Based Descriptors by Ramadan, Qusai Hussein

    Published 2009
    “…Based on the undertaken experiment, the IBK algorithm is noted to generate the highest classification accuracy (74.8%) compared to several other algorithms provided in the Weka tool. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7
  8. 8

    Quality checking and inspection based on machine vision technique to determine tolerancevalue using single ceramic cup by Mohd Ali, Nursabillilah, Karis, Mohd Safirin, Wong, Gao Jie, Bahar, Mohd Bazli, Sulaiman, Marizan, Mat Ibrahim, Masrullizam, Zainal Abidin, Amar Faiz

    Published 2017
    “…It is also designed to track specific colour of product and conduct the inspection process. Programming language of python and open source computer vision library were used to design the inspection algorithm based on the algorithm required to achieve the inspection task. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Quality checking and inspection based on machine vision technique to determine tolerance value using single ceramic cup by Mohd Ali, Nursabillilah, Karis, Mohd Safirin, Wong, Gao Jie, Bahar, Mohd Bazli, Sulaiman , Marizan, Mat Ibrahim, Masrullizam, Zainal Abidin, Amar Faiz

    Published 2016
    “…It is also designed to track specific color of product and conduct the inspection process. Programming language of python and open source computer vision library were used to design the inspection algorithm based on the algorithm required to achieve the inspection task. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Hybrid evolutionary-dolphin echolocation programming for sizing optimization of stand-alone photovoltaic systems / Zulkifli Othman by Othman, Zulkifli

    Published 2021
    “…Initially, Iterative-based Sizing Algorithm (ISA) which uses the non-computational intelligence-based approach is presented to serve as the benchmark for computational intelligence (CI)-based sizing algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Online Programming Judge System (UOJ) by Tran , Quang Trung

    Published 2013
    “…Based on the problem that it is time consuming for lecturers to manually compile, run and verify every student programs for judging. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat by Minhat, Abdul Rahman

    Published 2008
    “…This thesis presents the Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission system. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Recognition of isolated elements picture using backpropagation neural network / Melati Sabtu by Sabtu, Melati

    Published 2005
    “…There are three main programs work together. The programs are back-propagation neural network program, training and performance program and recognition program. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An event-driven simulation for highest urgency first (HUF) : a latency and modulation aware bandwidth allocation algorithm for WiMAX base stations. by Naghshbandi, Danial, Subramaniam, Shamala, Moghadam, Saeed Rahimi

    Published 2013
    “…To strike an ideal balance in gauging these trade-offs and to further complement the repository of simulators, this paper presents the details of a general-purpose programming language based discrete event simulation for WiMAX. …”
    Get full text
    Get full text
    Article
  17. 17

    The implementation of forward chaining algorithm in calculating inheritance property based on faraid law / Nur Ain Syafiqah Mohammad Marzuki by Mohammad Marzuki, Nur Ain Syafiqah

    Published 2021
    “…However, the problems that occur to practice the Faraid among Muslim is the beneficiaries do not really understand the concept of Faraid that may lead to misunderstanding about Faraid distribution and have narrowed its application that will make it unworkable. Therefore, the purpose of this study is to facilitate the use of Forward Chaining Algorithm to calculate Faraid based on inheritance division. …”
    Get full text
    Get full text
    Student Project
  18. 18

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…The result shows that with native programming on Android platform, even a complicated object detection algorithm can be done in real-time.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Genetic programming based machine learning in classifying public-private partnerships investor intention / Ahmad Amin ... [et al.] by Amin, Ahmad, Rahmawaty, Rahmawaty, Lautania, Maya Febrianty, Abdul Rahman, Rahayu

    Published 2023
    “…A significant challenge for the government is the insufficient private sector engagement in PPP arrangements. Hence, the purpose of this study is to evaluate the effectiveness of machine learning prediction models in categorizing private investor interest in PPP programs based on Indonesia evidences. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…Besides, Extended Kalman Filter (EKF) algorithm was selected in this project as an algorithm for offline estimation data purposes. …”
    Get full text
    Get full text
    Student Project