Search Results - (( using modification research algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1
  2. 2

    An analysis of the parameter modifications in varieties of harmony search algorithm by Mansor, N. F., Abal Abas, Zuraida, Abdul Rahman, Ahmad Fadzli Nizam, Shibghatullah, Abdul Samad, Safiah , Sidek

    Published 2014
    “…This analysis provides a useful motivation for researchers interested to improve the achievement of the standard HS algorithm and enhance the solution convergence rate and flexibility.…”
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    An analysis of the parameter modifications in varieties of harmony search algorithm by Nur Farraliza, Mansor, Zuraida, Abal Abas, Ahmad Fadzli Nizam, Abdul Rahman

    Published 2014
    “…This analysis provides a useful motivation for researchers interested to improve the achievement of the standard HS algorithm and enhance the solution convergence rate and flexibility.…”
    Get full text
    Get full text
    Article
  5. 5

    New selection algorithm for Mengubah Destini Anak Bangsa (MDAB) students / Zamali Tarmudi ... [et al.] by Tarmudi, Zamali, Saibin, Tammie Christy, Naharu, Nasrah, Ung, Ling Ling

    Published 2014
    “…This research introduces a new algorithm to select students from low income family the so-called Mengubah Destini Anak Bangsa (MDAB) using fuzzy approach. …”
    Get full text
    Get full text
    Research Reports
  6. 6
  7. 7
  8. 8
  9. 9

    Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms by Koh, Johnny Siaw Paw

    Published 2008
    “…Also, this research involves in developing a machine-learning system and program via genetic algorithm that is capable of performing independent learning capability and optimization for scanning sequence using novel GA operators. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2015
    “…And even though several of the code based addresses procedural programs. Some researchers addressed the issue of test case prioritization using Genetic Algorithm, but the authors do not select modification-revealing before prioritization and used the same fault severity. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Convergence of interval symmetric single-step method for simultaneous inclusion of real polynomial zeros by Salim, Nur Raidah

    Published 2012
    “…This thesis will cover the algorithms, theoretical analysis and numerical results for each modification. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…The issue of providing end-toend data protection should has been given highest priority by IoT application developer because the data in both private and public networks can be modified and disrupted by attacker. This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Investigating Inclusion of Safety Metrics for Safe Route Determination on Pedestrian Map by ONG, WEI HAN

    Published 2011
    “…To develop the safest route algorithm, it is important to research on the appropriate safety metrics that will be used to develop the safest route algorithm. …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    Efficiency and fairness of new-additive increase multiplicative decrease congestion avoidance and control algorithm by Jasem, Hayder Natiq, Ahmad Zulkarnain, Zuriati, Othman, Mohamed, Subramaniam, Shamala

    Published 2011
    “…And also all of the researches for the congestion avoidance algorithms, interest about this parameters metrics to evaluate the performance of the algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Graph coloring program of exam scheduling modeling based on bitwise coloring algorithm using python by Arifin, Samsul, Muktyas, Indra Bayu, Al Maki, Wikky Fawwaz, Mohd Khairul Bazli, Mohd Aziz

    Published 2022
    “…Bitwise operations make this algorithm run very fast. The algorithm constructed by the researcher is a modification of Komosko, etc.’s algorithm in 2015 and it is the key result of this research. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Grammar-based prosody modification for explicit control Malay language storytelling speech synthesis / Muhammad Izzad Ramli by Ramli, Muhammad Izzad

    Published 2018
    “…Using Harmonic Noise Model (HNM) as the synthesizer, the grammar-based prosody modification rules are used to produce the synthesized storytelling speech. …”
    Get full text
    Get full text
    Thesis