Search Results - (( using function method algorithm ) OR ( based application during algorithm ))

Refine Results
  1. 1

    Sports tournament scheduling using genetic algorithm / Hafeezur Syakir Abdul Motok@Mohd Ridzuan by Abdul Motok@Mohd Ridzuan, Hafeezur Syakir

    Published 2020
    “…The functionality testing is conducted using Blackbox testing technique to test the functionality of the project.…”
    Get full text
    Get full text
    Thesis
  2. 2

    E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan by Mohd Ridzuan, Nur Hafizah

    Published 2020
    “…The objective of the project is to design and develop an E-History Malaysian secondary school textbook system using Term Frequency-Inverse Document Frequency (TF-IDF) algorithm with text visualization and also to test the functionality and usability of the system through a web-based system. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Web cluster load balancing via genetic-fuzzy based algorithm by Chin, Wen Cheong, Lim, Amy Hui Lan

    Published 2007
    “…Finally, a simulation of 20 load-weight indices in a topology of 3-cube form Web cluster is implemented to illustrate the functionality of the proposed method.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    MotionSure: a cloud-based algorithm for detection of injected object in data in motion by Islam, Thouhedul, Olanrewaju, Rashidah Funke, Khalifa, Othman Omran

    Published 2017
    “…Total 1600 different type of files were used for evaluation of the proposed algorithm, results show that 87% of injected objects were correctly detected…”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Firefly analytical hierarchy algorithm for optimal allocation and sizing of distributed generation in radial distribution network by Bujal, Noor Ropidah

    Published 2022
    “…As for multi-objective functions associated with the optimisation problem, a weight-sum method is typically used to determine each objective function's coefficient factors (CF). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Opposition-based spiral dynamic algorithm with an application to optimize type-2 fuzzy control for an inverted pendulum system by Nasir, Ahmad Nor Kasruddin, Abdul Razak, Ahmad Azwan

    Published 2022
    “…Spiral Dynamic Algorithm (SDA) is a group-based optimization algorithm formulated based on the concept of a natural spiral phenomenon on earth. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    The application of queuing theory model using the DSW Algorithm and the L-R Method to optimize customer flow at Pizza Hut / Anis Natasha Mohamad Nizam, Nurfatihah Nadirah Noor Azla... by Mohamad Nizam, Anis Natasha, Noor Azlan, Nurfatihah Nadirah, Fazli, Nur Izzati Aliah

    Published 2022
    “…This study aims to compare the behaviors of a queuing system at an order counter using the Fuzzy Queuing Model, which are the Dong, Shah, and Wong (DSW) Algorithm and the Left-Right (L-R) Method. …”
    Get full text
    Get full text
    Student Project
  8. 8

    Genetic algorithm techniques for the design of nonlinear microwave circuits by Arsat, Rashidah

    Published 2004
    “…In this report a hybrid method of Sample Balance Genetic Algorithm (SBGA) used to analyze nonlinear diode excited by RF circuit. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects by Olanrewaju, Rashidah Funke, Islam, Thouhedul, Khalifa, Othman Omran, Fajingbesi, Fawwaz Eniola

    Published 2018
    “…A two layer encryption functions in PHP was designed for detecting injected object; bcrypt methods in Laravel and MD5 that generate 32 random keys. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems by Nor Sakinah, Abdul Shukor

    Published 2019
    “…So far, the tuning methods used for data-driven PID for the underactuated systems are mostly based on the multi-agent-based optimization, which means that the design requires substantial computation time and make it not practical for on-line tuning applications. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems by Nor Sakinah, Abdul Shukor

    Published 2019
    “…So far, the tuning methods used for data-driven PID for the underactuated systems are mostly based on the multi-agent-based optimization, which means that the design requires substantial computation time and make it not practical for on-line tuning applications. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…To improve the proposed algorithm, GA was utilized to identify the best choice for ‘‘mother wavelet function” and “decomposition level” of the signals by means of the fundamental fitness function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: a comprehensive review by Gumaida, Bassam, Ibrahim, Adamu Abubakar

    Published 2025
    “…This paper serves as a comprehensive background on localization algorithms and methods used in wireless sensor networks, offering insights for researchers to develop efficient localization algorithms tailored to specific application requirements in diverse work environments.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A study on one way hashing function and its application for FTMSK webmail / Noor Hasimah Ibrahim Teo by Ibrahim Teo, Noor Hasimah

    Published 2005
    “…One of it is call one-way hashing function. One-way hashing function consists of several algorithms. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Modelling of multi-robot system for search and rescue by Poy, Yi Ler

    Published 2023
    “…Moreover, to cope with dynamic environments, a combination of global and local path planning methods is introduced. The PSO algorithm functions as a global path planner, determining the complete path for each robot, whereas a sensor-based obstacle avoidance algorithm serves as a local planner to avoid collision with dynamic obstacles during navigation. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    An enhanced mobile internet protocol version 6 (IPv6) with multicast function and hierarchical design. by Khatun, Sabira

    Published 2006
    “…It integrates hierarchical concept and multicast function. Hierarchical design is used to shield the micro mobility from macro mobility in order to reduce location update signal and signalling traffic within micro level network while multicasting is used to send packets to Mobile Node (MN) through base stations that are near to MN. …”
    Get full text
    Patent
  17. 17

    Fruit-Fly Based Searching Algorithm For Cooperative Swarming Robotic System by Abidin, Zulkifli Zainal

    Published 2013
    “…A number of benchmark function processes were conducted to assess the performance of proposed FOA (Fly Optimisation Algorithm).…”
    Get full text
    Get full text
    Thesis
  18. 18

    Parameter characterization of PEM fuel cell mathematical models using an orthogonal learning-based GOOSE algorithm by Manoharan P., Ravichandran S., Kavitha S., Tengku Hashim T.J., Alsoud A.R., Sin T.C.

    Published 2025
    “…The orthogonal learning mechanism improves the performance of the original GOOSE algorithm. This FC model uses the root mean squared error as the objective function for optimizing the unknown parameters. …”
    Article
  19. 19

    A study on component-based technology for development of complex bioinformatics software by Ali Shah, Zuraini, Deris, Safaai, Othman, Muhamad Razib, Zakaria, Zalmiyah, Saad, Puteh, Hassan, Rohayanti, Muda, Mohd. Hilmi, Kasim, Shahreen, Roslan, Rosfuzah

    Published 2004
    “…The second layer uses discriminative SVM algorithm with a state-of-the-art string kernel based on PSI-BLAST profiles that is used to leverage the unlabeled data. …”
    Get full text
    Get full text
    Monograph
  20. 20