Search Results - (( using modification research algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- modification research »
- using modification »
- research algorithm »
- java application »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Bio-inspired computation: Recent development on the modifications of the cuckoo search algorithm
Published 2017“…Several researchers have attempted to apply several modifications to the original cuckoo search algorithm in order to advance its effectiveness. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
An analysis of the parameter modifications in varieties of harmony search algorithm
Published 2014“…This analysis provides a useful motivation for researchers interested to improve the achievement of the standard HS algorithm and enhance the solution convergence rate and flexibility.…”
Get full text
Get full text
Article -
4
Analysis and Modification of Grain - 128 Stream Cipher Algorithm
Published 2024thesis::master thesis -
5
An analysis of the parameter modifications in varieties of harmony search algorithm
Published 2014“…This analysis provides a useful motivation for researchers interested to improve the achievement of the standard HS algorithm and enhance the solution convergence rate and flexibility.…”
Get full text
Get full text
Article -
6
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
7
New selection algorithm for Mengubah Destini Anak Bangsa (MDAB) students / Zamali Tarmudi ... [et al.]
Published 2014“…This research introduces a new algorithm to select students from low income family the so-called Mengubah Destini Anak Bangsa (MDAB) using fuzzy approach. …”
Get full text
Get full text
Research Reports -
8
-
9
Modification of particle swarm optimization algorithm for optimization of discrete values
Published 2011Get full text
Get full text
Research Reports -
10
-
11
Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms
Published 2008“…Also, this research involves in developing a machine-learning system and program via genetic algorithm that is capable of performing independent learning capability and optimization for scanning sequence using novel GA operators. …”
Get full text
Get full text
Thesis -
12
-
13
-
14
Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity
Published 2015“…And even though several of the code based addresses procedural programs. Some researchers addressed the issue of test case prioritization using Genetic Algorithm, but the authors do not select modification-revealing before prioritization and used the same fault severity. …”
Get full text
Get full text
Conference or Workshop Item -
15
-
16
Convergence of interval symmetric single-step method for simultaneous inclusion of real polynomial zeros
Published 2012“…This thesis will cover the algorithms, theoretical analysis and numerical results for each modification. …”
Get full text
Get full text
Thesis -
17
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…The issue of providing end-toend data protection should has been given highest priority by IoT application developer because the data in both private and public networks can be modified and disrupted by attacker. This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
Get full text
Get full text
Thesis -
18
Investigating Inclusion of Safety Metrics for Safe Route Determination on Pedestrian Map
Published 2011“…To develop the safest route algorithm, it is important to research on the appropriate safety metrics that will be used to develop the safest route algorithm. …”
Get full text
Get full text
Final Year Project -
19
Efficiency and fairness of new-additive increase multiplicative decrease congestion avoidance and control algorithm
Published 2011“…And also all of the researches for the congestion avoidance algorithms, interest about this parameters metrics to evaluate the performance of the algorithms. …”
Get full text
Get full text
Get full text
Article -
20
Graph coloring program of exam scheduling modeling based on bitwise coloring algorithm using python
Published 2022“…Bitwise operations make this algorithm run very fast. The algorithm constructed by the researcher is a modification of Komosko, etc.’s algorithm in 2015 and it is the key result of this research. …”
Get full text
Get full text
Get full text
Article
