Search Results - (( programming user search algorithm ) OR ( java data function algorithm ))
Search alternatives:
- function algorithm »
- programming user »
- data function »
- user search »
- java »
-
1
-
2
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…Indexer" to decide and index the relevant web pages, and ''Search algorithm" to retrieve the data from the results of indexing. …”
Get full text
Get full text
Thesis -
3
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
4
-
5
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023Conference paper -
6
-
7
-
8
-
9
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. …”
Get full text
Get full text
Thesis -
10
Applying case reuse and Rule-Based Reasoning (RBR) in object-oriented application framework documentation: Analysis and design
Published 2023Conference Paper -
11
-
12
Null steering of adaptive beamforming using linear constraint minimum variance assisted by particle swarm optimization, dynamic mutated artificial immune system, and gravitational...
Published 2023“…Furthermore, the proposed GSA can be applied as a more effective technique in LCMV beamforming optimization as compared to the PSO technique. The algorithms were implemented using Matlab program. © 2014 Soodabeh Darzi et al.…”
Article -
13
Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems
Published 2018“…Urban Transit Scheduling Problem (UTSP) considers the process of creating timely transit schedules that includes bus and drivers assignment based on the users' and operators’ requirements. This thesis studies multiobjective UTSP consisting of frequency setting, timetabling, simultaneous bus and driver scheduling by applying Multiple Tabu Search (MTS) algorithm. …”
Get full text
Get full text
Thesis -
14
Low-level hybridization scripting language with dynamic parameterization in PSO-GA / Suraya Masrom
Published 2015“…In addition, research has identified that the existing tools are not adequately designed to enable users to easily develop the algorithms with the dynamic parameterization. …”
Get full text
Get full text
Book Section -
15
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
17
Some Metaheuristics for Tourist Trip Design Problem
Published 2023“…We have built two metaheuristic algorithms based on the proposed approach, which are Genetic Algorithm (GA) and another is Ant Colony Optimization (ACO). …”
Get full text
Get full text
Conference or Workshop Item -
18
A Compromise Programming to Task Assignment Problem in Software Development Project
Published 2021“…We designed a genetic algorithm scheme to solve the transformed problem. …”
Get full text
Get full text
Article -
19
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
20
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article
