Search Results - (( using function methods algorithm ) OR ( based application customization algorithm ))

Refine Results
  1. 1

    The application of queuing theory model using the DSW Algorithm and the L-R Method to optimize customer flow at Pizza Hut / Anis Natasha Mohamad Nizam, Nurfatihah Nadirah Noor Azla... by Mohamad Nizam, Anis Natasha, Noor Azlan, Nurfatihah Nadirah, Fazli, Nur Izzati Aliah

    Published 2022
    “…This study aims to compare the behaviors of a queuing system at an order counter using the Fuzzy Queuing Model, which are the Dong, Shah, and Wong (DSW) Algorithm and the Left-Right (L-R) Method. …”
    Get full text
    Get full text
    Student Project
  2. 2

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…The manual method often has a lack of knowledge that the menu that shows the customer does not provide any information that customers need, such as an image of the food or ingredients used in the menu. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Real-time vision-based Malaysian road sign recognition using an artificial neural network / Kh Tohidul Islam by Kh Tohidul , Islam

    Published 2017
    “…In the second stage, an introduced robust Custom Feature Extraction method is used for the first time in a road sign recognition approach. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Development of a building energy analysis package (BEAP) and its application to the analysis of cool thermal energy storage systems by Senawi, M. Y.

    Published 2001
    “…Efficient methods of calculating custom weighting factors for load estimation using the transfer function method are also developed. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A realtime Runner Help Me mobile application using geolocation technique / Nurul Amierah Abd Rahman by Abd Rahman, Nurul Amierah

    Published 2019
    “…Afterward, the runner will pick random number or based on the job without having specific algorithm to charge the customer. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Genetic algorithm optimization of product design for environmental impact reduction / Julirose Gonzales by Julirose , Gonzales

    Published 2018
    “…Analysis of the effect of changing the product design parameters such as its dimensions, and basic features on the environmental impact of machining process in terms of its power consumption, waste produced and the chemicals and other consumables used up during the process is the key method in this research. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Malaysia network transit route adviser system by Mohd Syafiq, Bachok

    Published 2010
    “…MANTRA using Dijkstra's Algorithm to realize these functions. frIANTRA 98% successfully to advice the tourist goes to the destination using Malaysia Transit.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Outage probability analysis of Co-Tier interference in heterogeneous network by Hasan, Mohammad Kamrul, Ismail, Ahmad Fadzil, Hashim, Wahidah, Islam, Shayla, Hassan Abdalla Hashim, Aisha

    Published 2017
    “…The outage probability countenance is expressed for the moment-generating function of the total SINR at the receivers end. The simulation results demonstrate that the HGBBDSA can lessen the outage to 45 % than existing methods.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    DurianCare: optimising trunk disease detection and precision farming in a mobile application / Muhammad Haziq Azmi by Azmi, Muhammad Haziq

    Published 2025
    “…The project will implement automated detection and disease management recommendation algorithms while evaluating the functionality and usability of the designed application. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Real-Time (Vision-Based) Road Sign Recognition Using an Artificial Neural Network by Islam, K.T., Raj, R.G.

    Published 2017
    “…In the first stage, a hybrid color segmentation algorithm has been developed and tested. In the second stage, an introduced robust custom feature extraction method is used for the first time in a road sign recognition approach. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…In Chapter 2, we propose a new algorithm based on incremental Radial Basis Function Network (RBFN) to accelerate the learning in stream data. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Finding the root of nonlinear function using five bracketing method / Nur Afiqah Mohamed Azhar by Mohamed Azhar, Nur Afiqah

    Published 2019
    “…Therefore, numerical method in the form of bracketing method is often used to find only the approximate root of the function. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions by Abbas, Iraq Tareq

    Published 2018
    “…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Determining the preprocessing clustering algorithm in radial basis function neural network by S.L. Ang, H.C. Ong, H.C. Law

    Published 2008
    “…Three types of method used in this study to find the centres include random selections, K-means clustering algorithm and also K-median clustering algorithm. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    Genetic Algorithms In Optimizing Membership Function For Fuzzy Logic Controller by Ismail, H. Muh Yusuf

    Published 2010
    “…Thus it is important to select the accurate membership functions but these methods possess one common weakness where conventional FLC use membership function and control rules generated by human operator. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis