Search Results - (( set generation process algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Java based expert system for selection of natural fibre composite materials by Ahmed Ali, Basheer A., Salit, Mohd Sapuan, Zainudin, Edi Syams, Othman, Mohamed

    Published 2013
    “…The expert system performance tested with automotive component as case study with high, medium and low precision criteria and the result sets generated by the expert system comply with industrial benchmark.…”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…The weighted-range method (WRM) was introduced to identify the range value and to scrutinize the candidate materials in the selection process. The expert system performance was tested with automotive component as a case study with high,medium and low precision criteria and the result sets generated by the expert system comply with industry benchmarks. …”
    Get full text
    Get full text
    Thesis
  4. 4

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Comparison between starter sets generation method for listing all permutations by Karim, Sharmila, Ibrahim, Haslinda, Omar, Zurni

    Published 2013
    “…distinct permutations is an exhaustive process.Using starter set, the process of listing the permutations becomes easy.However a problem arises when the equivalence starter sets will generate the similar permutation and needed to be discarded.Two new recursive strategies are proposed to generate starter sets without generating equivalence starter sets namely circular and exchange two elements operation.Once the starter sets are obtained, the circular and reverse of circular operation are employed to produce distinct permutation from each starter sets.Computational advantages are presented comparing the results obtained by the new method with two other existing methods.The result indicates that the exchange two elements based strategy is faster than the circular based.Overall all new algorithms are better than existing algorithms in time execution.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A permutation parallel algorithm under exchange restriction with message passing interface by Karim, Sharmila, Omar, Zurni, Ibrahim, Haslinda

    Published 2014
    “…However permutation generation is time consuming process, the implementation of sequential algorithm to parallel computation is the option for reducing the computation time. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Starter Set Generation Based on Factorial Numbers for Half Wing of Butterfly Representation by Karim, Sharmila, Ibrahim, Haslinda

    Published 2021
    “…However, in the new algorithm, this process is replaced by factorial numbers. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  9. 9

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The experiments were conducted on self generated data sets (7 different sets) and well known datasets (Mushroom & Cars Data set). …”
    Get full text
    Get full text
    Thesis
  10. 10

    A filtering algorithm for efficient retrieving of DNA sequence by Abdul Rahman, Mohd Nordin, Mohd. Saman, Md. Yazid, Ahmad, Aziz, Md. Tap, Abu Osman

    Published 2009
    “…Heuristics algorithms can process a fast DNA sequence alignment, but generate low comparison sensitivity. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    New recursive circular algorithm for listing all permutations by Karim, Sharmila, Omar, Zurni, Ibrahim, Haslinda, Othman, Khairil Iskandar, Suleiman, Mohamed

    Published 2014
    “…Linear array of permutations is hard to be factorized.However, by using a starter set, the process of listing the permutations becomes easy. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Shuffling algorithms for automatic generator question paper system. by Mohd Jamail, Nor Shahida, Md Sultan, Abu Bakar

    Published 2010
    “…This paper describes the usage of shuffling algorithm in an Automatic Generator Question paper System (GQS) as a randomization technique for organising sets of exam paper. …”
    Get full text
    Get full text
    Article
  13. 13

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…Fuzzy modeling is a process of generating parameters which are fuzzy rule and membership function. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Optimized clustering with modified K-means algorithm by Alibuhtto, Mohamed Cassim

    Published 2021
    “…In dealing with correlated variables, PCA was embedded in the proposed algorithm. The developed algorithms were tested on uncorrelated and correlated simulated data sets, generated under various conditions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    New recursive circular algorithm for listing all permutations by Karim, Sharmila, Omar, Zurni, Ibrahim, Haslinda, Othman, Khairil Iskandar, Suleiman, Mohamed

    Published 2014
    “…However, by using a starter set, the process of listing the permutations becomes easy. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A modified technique in RFID networking planning and optimization by Nawawi, Azli

    Published 2015
    “…In this research, PSO algorithm was used in the optimization process as it was considered as a very useful, efficient and well known algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    A hybrid kidney algorithm strategy for combinatorial interaction testing problem by Ameen Ali, Mohammed Ba Homaid

    Published 2022
    “…HKA addresses the limitations in KA by improving the algorithm's exploration and exploitation processes by hybridizing KA with mutation operator, and improve the balancing control process by enhancing the filtration process in KA. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Development of heuristic methods based on genetic algorithm (GA) for solving vehicle routing problem by Ismail, Zuhaimy, Nurhadi, Irhamah, Zainuddin, Zaitul Marlizawati

    Published 2008
    “…However, simulated annealing generates only one mutated solution but Tabu Search generates many mutated solutions and moves to the solution with the lowest fitness of those generated. …”
    Get full text
    Get full text
    Monograph
  20. 20

    Enhanced marking process (EMP) for constructing dominating set in mobile ad-hoc networks with unidirectional links by Waheed, Bassam M. S., Mohd Ali, Borhanuddin, Khatun, Sabira, Mohd Sidek, Roslina

    Published 2014
    “…The proposed algorithm is integrated with AODV routing protocol to generate a connected dominating set that will be responsible on flooding activity. …”
    Get full text
    Get full text
    Get full text
    Article