Search Results - (( program top method algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- method algorithm »
- java application »
- program top »
- top method »
-
1
Development of sensor based transparent object handling using robot manipulator
Published 2024text::Final Year Project -
2
The discovery of Top-K DNA frequent patterns with approximate method / Nittaya Kerdprasop and Kittisak Kerdprasop
Published 2014“…These representatives are subsequently used in the main process of frequent pattern mining. Our designed algorithm had been implemented with the Erlang language, which is the functional programming paradigm with inherent support for pattern matching. …”
Get full text
Get full text
Get full text
Article -
3
Detection of Microcalcification Using Mammograms
Published 2004“…The top hat method consists of four stages which are digitization of mammograms, image enhancement, image segmentation and feature extraction. …”
Get full text
Get full text
Final Year Project -
4
Mixed convection in an inclined lid-driven square cavity with sinusoidal heating on top lid
Published 2017“…The vertical walls are insulated and the cavity is filled with water. Finite volume method and SIMPLE algorithm are employed to solve the dimensionless governing equations. …”
Get full text
Get full text
Article -
5
Optimizing tree planting areas through integer programming and improved genetic algorithm
Published 2012“…Therefore, a hybrid algorithm through an incorporation of Integer Programming and Improved Genetic Algorithm was proposed for planting lining design. …”
Get full text
Get full text
Thesis -
6
Employing longest common subsequence method to retrieve translated Al-Quran documents / Muhamad Shamsudin
Published 2001“…This method is employed to retrieve documents from the translated Al-Quran. …”
Get full text
Get full text
Thesis -
7
Peer to Peer Video Streaming Application
Published 2008“…The program will be done using Java enviromnent and its algorithms. …”
Get full text
Get full text
Final Year Project -
8
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
-
12
-
13
Development of a software for simulating active force control schemes of a two-link planar manipulator
Published 2005“…On Top Of That, The Graphical Results Can Be Observed And Analysed On-Line While The Program Is Running. …”
Get full text
Get full text
Get full text
Article -
14
Automatic generation of neural game controller using single and bi-objective evolutionary optimization algorithms for RTS Game
Published 2015“…Therefore, the main objective of this research is to investigate the performance of single objective and bi-objectives of the hybridised EC as a RTS game controller for reinforcement issue. The proposed EC methods are Genetic Algorithm (GA), Differential Evolution (DE), Evolutionary Programming (EP), and Pareto-based Differential Evolution (PDE). …”
Get full text
Get full text
Get full text
Thesis -
15
A Framework for Green Energy Resources Identification and Integration Supported by Real-Time Monitoring, Control, and Automation Applications
Published 2025“…Validation against conventional methods and state-of-the-art algorithms confirmed the superior performance of the proposed approach. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Development of a software for simulating active force control schemes of a two–link planar manipulator
Published 2005“…On top of that, the graphical results can be observed and analysed on–line while the program is running. …”
Get full text
Get full text
Get full text
Article -
17
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Analyzing the cost-effectiveness of enhancement approaches for rehabilitating water distribution network
Published 2021“…The results show that cost-effective enhancement approaches are programming, models, supervisory control and data acquisition (SCADA), and twin digital. …”
Get full text
Get full text
Thesis -
20
Technical efficiency performance of Malaysian public research universities: Fuzzy data envelopment analysis / Saber Abdelall Mohamed Ahmed
Published 2023“…This study integrates the concept of fuzzy set theory with the traditional DEA by introducing an algorithm to measure the technical efficiency of PRUMs in the form of fuzzy linear programming (FLP) models. …”
Get full text
Get full text
Get full text
Thesis
