Search Results - (( structured solution mining algorithm ) OR ( java application system algorithm ))

Refine Results
  1. 1

    Mine blast algorithm for optimization of truss structures with discrete variables by Sadollah, Ali, Bahreininejad, A., Eskandar, Hadi, Abd Shukor, Mohd Hamdi

    Published 2012
    “…In this study a novel optimization method is presented, the so called mine blast algorithm (MBA). The fundamental concepts and ideas of MBA are derived from the explosion of mine bombs in real world. …”
    Get full text
    Article
  2. 2

    A numerical method for frequent pattern mining by Mustapha, Norwati, Nadimi-Shahraki, Mohammad-Hossein, Mamat, Ali, Sulaiman, Md. Nasir

    Published 2009
    “…Frequent pattern mining is one of the active research themes in data mining. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Development and applications of metaheuristic algorithms in engineering design and structural optimization / Ali Sadollah by Ali, Sadollah

    Published 2013
    “…In addition, two novel optimization methods are developed and presented which are named the mine blast algorithm (MBA) and the water cycle algorithm (WCA). …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7
  8. 8

    Medical diagnosis using data mining techniques / Shaiful Nizam Zamri by Shaiful Nizam , Zamri

    Published 2003
    “…The system design part will explains the flow and functionality of the system structure. Then, the system implementation part explains the selected tools chosen for implementing the system which using the Clementine Data Mining Solution. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    A hybrid local search algorithm for minimum dominating set problems by Abed, S.A., Rais, H.M., Watada, J., Sabar, N.R.

    Published 2022
    “…This algorithm focuses on generating promising solutions in different areas of the solution space using the problem search history. …”
    Get full text
    Get full text
    Article
  13. 13

    A hybrid local search algorithm for minimum dominating set problems by Abed, S.A., Rais, H.M., Watada, J., Sabar, N.R.

    Published 2022
    “…This algorithm focuses on generating promising solutions in different areas of the solution space using the problem search history. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16
  17. 17

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Hybridised Network of Fuzzy Logic and a Genetic Algorithm in Solving 3-Satisfiability Hopfield Neural Networks by Farah Liyana, Azizan, Saratha, Sathasivam, Majid Khan, Majahar Ali, Nurshazneem, Roslan, Caicai, Feng

    Published 2023
    “…This work proposed a new hybridised network of 3-Satisfiability structures that widens the search space and improves the effectiveness of the Hopfield network by utilising fuzzy logic and a metaheuristic algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
    Get full text
    Get full text
    Thesis