Search Results - (( user computing techniques algorithm ) OR ( java optimisation system algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm by Muhammad Syahril Mohamad Sainal

    Published 2022
    “…This research will conduct comparison of hybrid Genetic Algorithm and Bat Algorithm (GA-BA) with Genetic Algorithm (GA) and Bat Algorithm (BA). …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  5. 5
  6. 6

    An improved dynamic load balancing for virtualmachines in cloud computing using hybrid bat and bee colony algorithms by Ullah, Arif

    Published 2021
    “…Therefore, to overcome these problems, this study proposed an improved dynamic load balancing technique known as HBAC algorithm which dynamically allocates task by hybridizing Artificial Bee Colony (ABC) algorithm with Bat algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Restaurant locator using Djikstra Algorithm / Mohamad Aliff Hakimi Lukman Hakim by Lukman Hakim, Mohamad Aliff Hakimi

    Published 2017
    “…Dijkstra’s algorithm is the technique that can solve the problem by itself. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  10. 10

    Graphical user authentication system (GUAS) by Tan, Woei Wen

    Published 2014
    “…Nowadays, the most accepted computer authentication technique is to use alphanumerical usernames with text-based password. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11
  12. 12

    Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks by Salman, Emad Hmood

    Published 2018
    “…The Energy Detection (ED) technique is the simplest and low computational complexity. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Various CPS techniques have been proposed such as PAC, IPO, Flowchart and Algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar by Bakhtiar, Badariyah

    Published 2007
    “…System architecture was designed and implement in video adaptation algorithms development. Through the algorithm, rule-based technique was used. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Mobile game application development using evolutionary algorithms by Ong, Jia Hui

    Published 2014
    “…The aim of this research is to develop an application that contains evolutionary computing techniques that will be used by the user as an entertainment tool. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20