Search Results - (( program using drops algorithm ) OR ( java application path algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Smart appointment organizer for mobile application / Mohd Syafiq Adam by Adam, Mohd Syafiq

    Published 2009
    “…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…The system architecture integrates ROS 2 on a Raspberry Pi, with TCP/IP connectivity enabling remote operation. An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Congestion management based optimization technique using bee colony by Rahim M.A., Musirin I., Abidin I.Z., Othman M.M., Joshi D.

    Published 2023
    “…Tests conducted on the IEEE 30-Bus Reliability Test System for performance assessment revealed that the proposed bee algorithm technique is better than evolutionary programming technique in addressing this problem. �2010 IEEE.…”
    Conference Paper
  6. 6

    Enhanced Intelligent Water Drops Algorithm for University Examination Timetabling Problems by Bashar AbedAl Mohdi Talal AlDeeb

    Published 2024
    “…This thesis presents an investigation of using the Intelligent Water Drops (IWD) algorithm to construct and produce good quality solutions for the UETP. …”
    thesis::doctoral thesis
  7. 7

    OPTIMAL CABLE SELECTION IN RADIAL DISTRIBUTION NETWORKS CONSIDERING PLANNER'S DEFINED VOLTAGE DROP LIMIT by Ab Ghani, Mohd Ruddin

    Published 2002
    “…The resource of the cable inventory is also responsible for optimal selection of the cable. By using this proposed computer algorithm and program an example is solved successfully that is presented in the results.…”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    Simulation of single and dual layered rapid pressure swing adsorption by Lai, Yin Ling

    Published 2013
    “…It is also found that the oxygen product purity increases by almost 20% when the first layer is packed with Zeolite AgLiX and Zeolite 5A in the second layer. Higher pressure drop across the bed is induced when particles of smaller pressure drop are used in the first layer and particles of larger pressure drop are used in the second layer, hence leading to better separation. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Modelling and optimisation of blood glucose control for type 1 diabetes using multi-parametric programming and model-based predictive control (mp-MPC) / Associate Professor Dr Ayub... by Md. Som, Ayub

    Published 2014
    “…In doing so, Multi-Parametric Programming technique is used to develop the computer algorithm; whereas Model-Based Predictive Control (MPC) is adopted for the design of the controller. …”
    Get full text
    Get full text
    Monograph
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants by M, Irfan, N, Lukman, A. A, Alfauzi, J, Jumadi

    Published 2019
    “…The use of data mining algorithms is expected to help in the identification of pests and diseases in chili plants. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17
  18. 18

    Design and Development of Artificial Intelligence (Al)-Based Desicion Support System For Manufacturing Applications by Lim , Chee Peng

    Published 2016
    “…In the image processing stage, a flaw map, as described in the previous report, is used. Six welding defect types, namely Porosity{POR), Drop Through{DT), and Lack of Fusion{LOF), Lack of Penetration{LOP), Linear Indication{LI) and Undercut{UC), have been investigated. …”
    Get full text
    Monograph
  19. 19

    Effects of Authentication of Users in Mobile Internet Protocol Version 6 by Obenofunde, Simon Tabi

    Published 2004
    “…In this thesis, a user authentication program is modeled and simulated using Network simulator2 (NS2). …”
    Get full text
    Get full text
    Thesis
  20. 20