Search Results - (( program validating new algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance by Nor Azlan, Nor Asmaa Alyaa

    Published 2021
    “…Whereas, the validation from the real-world of the two datasets showed that the new augmentation algorithm steadily producing lesser iteration number compared to the conventional Simplex, QSM and BLSA algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…The proposed algorithms (Priority Dynamic Quantum Time and Multi Priority Dynamic Quantum Time Algorithms) are implemented using JAVA programming language and validated using Key Performance Indicators equations. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Development of a building energy analysis package (BEAP) and its application to the analysis of cool thermal energy storage systems by Senawi, M. Y.

    Published 2001
    “…It involves the development of new programs and modifications of an existing simulation program. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Optimal power flow based on fuzzy linear programming and modified Jaya algorithms by Alzihaymee, Warid Sayel Warid

    Published 2017
    “…The proposed algorithms have been examined and validated using the IEEE 30-bus and IEEE 118-bus test systems. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Euclidean space data projection classifier with cartesian genetic programming (CGP) by WK Wong, Gopal Lenin, Tan, Terence, Ali Chekima

    Published 2018
    “…This research work is a preliminary work which proposes an evolutionary-based classifier using a simplified Cartesian Genetic Programming (CGP) evolutionary algorithm. Instead on using evolutionary generated rule sets, the CGP generates i) a reference coordinate ii) projection functions to project data into a new 3 Dimensional Euclidean space. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…The classification accuracy obtained from the CST method is compared to other selected classification methods such as Value Difference Metric (VDM), Pre-Category Feature Importance (PCF), Cross-Category Feature Importance (CCF), Instance-Based Algorithm (IB4), Decision Tree Algorithms such as Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5), Rough Set methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) and Neural Network methods such as the Multilayer method.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Progressive damage analysis of composite layered plates using a mesh reduction method by Zahari, Rizal, El Zafrany, Ahmed

    Published 2006
    “…A progressive damage methodology and algorithm for composite laminates was successfully developed for the new finite strip methods using stress-based failure criteria. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Face recognition using eigenfaces and smooth support vector machine by Mhd, Furqan

    Published 2011
    “…Support Vector Machine (SVM) is a new algorithm of data mining technique, recently received increasing popularity in machine learning community. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    New fundamental theory in solving the royalty payment problem / Wan Noor Afifah Wan Ahmad and Suliadi Firdaus Sufahani by Wan Ahmad, Wan Noor Afifah, Sufahani, Suliadi Firdaus

    Published 2021
    “…Therefore, this study applied a new modified shooting method which is Sufahani-Ahmad-Newton-Golden-Royalty Algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14
  15. 15

    Embedded flower pollination evolutionary programming based technique for voltage stability enhancement with distributed generation installation by Mansor N.N., Shaaya S.A., Musirin I., Hannoon N.S., Mohamed Z., Zamani M.K.M.

    Published 2023
    “…In this study, a new technique is developed which combines the element of flower pollination into the general evolutionary programming algorithm. …”
    Article
  16. 16

    Hybrid evolutionarybarnacles mating optimisation-artificial neural network based technique for solving economic power dispatch planning and operation / Nor Laili Ismail by Ismail, Nor Laili

    Published 2024
    “…The third algorithm was validated on IEEE 30-Bus RTS only. Comparative studies were conducted concerning the traditional Evolutionary Programming (EP) and Barnacles Mating Optimiser (BMO) for performance evaluation of HEBMO and MOHEBMO. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Modeling of static and dynamic components of bio-nanorobotic systems by Gavgani, Hamidreza Khataee

    Published 2012
    “…The first modeling technique applies graph algorithms to compute a new set of optimal weighted structural properties of C60 and C70 fullerenes. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Modified firefly algorithm for directional overcurrent relay coordination in power system protection / Muhamad Hatta Hussain by Hussain, Muhamad Hatta

    Published 2020
    “…The Electric Transient and Analysis Program (ETAP) was used as the simulation tool, while Matrices Laboratory (MATLAB) was utilized to implement all the algorithms in this study. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Midblock signalled pedestrian crossing : alternative controller algorithms by Chik, Abdul Aziz, Ismail, Che Ros, Hainin, Mohd. Rosli

    Published 2000
    “…The measures of performance of all algorithms are evaluated using a fully calibrated and validated simulation program. …”
    Get full text
    Get full text
    Get full text
    Article