Search Results - (( programming probability function algorithm ) OR ( java _ integration algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection by Dhany, Saputra

    Published 2008
    “…A comprehensive performance study has been reported that PrefixSpan, one of the sequential pattern mining algorithms, outperforms GSP, SPADE, as well as FreeSpan in most cases, and PrefixSpan integrated with pseudoprojection technique is the fastest among those tested algorithms. …”
    Get full text
    Thesis
  5. 5

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    The Determination of Pile Capacity Using Artificial Neural-net: An Optimization Approach by Ab. Malik, Rosely, Jamil S., Mohamed

    Published 2001
    “…Using the developed algorithm, the safety measures involved are such as reliability index and the probability of failure; instead of only factor of safety if conventional deterministic approach is used. …”
    Get full text
    Get full text
    Article
  7. 7

    Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection by Saputra , Dhany, Rambli, Dayang R.A., Foong, Oi Mean

    Published 2008
    “…A comprehensive performance study has been reported that PrefixSpan, one of the sequential pattern mining algorithms, outperforms GSP, SPADE, as well as FreeSpan in most cases, and PrefixSpan integrated with pseudoprojection technique is the fastest among those tested algorithms. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong by Lily , Wong

    Published 2018
    “…The demands in SIRP are modeled by some probability functions and due to the stochastic nature of customer demands, the service levels constraint where it limits the stock out probability at each customer and the probability of overfilling the stock of each customer is introduced in this study. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Enhancing Power System Resilience Through Evolutionary Programming for High Impact Low Probability Events by Zakaria F., Musirin I., Kamari N.A.M., Aminuddin N., Johari D., Shaaya S.A., Bajwa A.A., Kumar A.V.S.

    Published 2025
    “…This paper presents enhancing power system resilience through evolutionary programming for high-impact low probability (HILP) events. …”
    Conference paper
  12. 12

    Application-Programming Interface (API) for Song Recognition Systems by Murtadha Arif Sahbudin, Chakib Chaouch, Salvatore Serrano

    Published 2024
    “…In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
    Article
  13. 13
  14. 14
  15. 15

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Investigating The Performance Of Metaheuristics To Optimize The Revenue Of Semiconductor Supply Chain by Roslee, Muhammad Sharifuddin

    Published 2022
    “…Below is the comparison of the fitness value among 20 metaheuristics algorithms run through Python programming.…”
    Get full text
    Get full text
    Monograph
  19. 19

    Optimal assignments of versions to processors in fault-tolerant computer systems by Leow, Soo Kar, McAllister, David F.

    Published 1988
    “…For voting system, k must be at least 2 and, in this case the objective function is non-linear. This implies that linear assignment algorithms cannot be used to obtain the optimal assignment. …”
    Get full text
    Get full text
    Article
  20. 20

    Biometrics electronic purse by Abdul Rahman, Abdul Wahab, Eng, Chong Tan, S., M. Heng

    Published 1999
    “…A proto-type of the proposed Biometrics Electronic Purse (BEP) was build using the Schlumberger Cyberflex Multi8K Java Card with a simple File Management Utilities software to upload download biometrics template to/&om the Java Card.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper