Search Results - (( waste reduction using algorithm ) OR ( java application modified algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Development of novel algorithm features in the modelling of cyclic processes by Choong, Thomas S.Y., Paterson, William R., Scott, David M.

    Published 2002
    “…In principle, the algorithm could be used for many cyclic process. Air separation using rapid pressure swing adsorption (RPSA) is used as an illustration. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A greedy heuristics multiple criteria model for solving multi-landfill site selection and plant propagation algorithm for improving waste collection vehicle routing solutions by Nur Azriati, Mat

    Published 2023
    “…This research focuses on two solid waste management (SWM) problems, particularly the landfill site selection problem (LSSP) and the waste collection vehicle routing problem (WCVRP). …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Nearest greedy for solving the waste collection vehicle routing problem: A case study by Mat, Nur Azriati, Benjamin, Aida Mauziah, Abdul-Rahman, Syariza, Wibowo, Antoni

    Published 2017
    “…This paper presents a real case study pertaining to an issue related to waste collection in the northern part of Malaysia by using a constructive heuristic algorithm known as the Nearest Greedy (NG) technique. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  13. 13

    The classification of FTIR plastic bag spectra via label spreading and stacking by Almanifi, Omair Rashed Abdulwareth, Ng, Jee Kwan, Anwar P. P., Abdul Majeed

    Published 2021
    “…Whereas plastics are a group of the most useful materials, widely used in all walks of life, the plastic waste that is produced daily poses a great threat towards wildlife and the planet as a whole. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Incorporating energy generation process in environmental assessment of a biopharmaceutical process by Auni Hamimi, Idris

    Published 2015
    “…Therefore, this work aims to estimate the PET value from WFT and pure steam generation using a simple algorithm which is modified from Waste Reduction (WAR) Algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Determination of energy usage and potential environment impact (pei) of a vapor compression distillation system for production of water for injection (wfi) in pharmaceutical indust... by Siti Nabihah, Abdul Latif

    Published 2014
    “…The amount of PET were analysed in waste reduction (WAR) algorithm using the amount of energy usage adapted from simulation. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    Flexible window-based scheduling with critical worst case latency evaluations for real time traffic in time sensitive networks by Muftah, Shalghum Khaled

    Published 2022
    “…The lowest bound is obtained with the maximum allowable that meets TT latency deadlines using the OFWOS algorithm. Thus, combining OFWOS and AVB-OBTTW evaluations can be a helpful guide for TSN designers to implement tighter and more trusted GCL schedules.…”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Snort-based smart and swift intrusion detection system by Olanrewaju, Rashidah Funke, Khan, Burhan Ul Islam, Najeeb, Athaur Rahman, Ku zahir, Ku Nor Afiza, Hussain, Sabahat

    Published 2018
    “…The simulation is performed using MATLAB. Findings: The proposed system has been verified to have high accuracy rate, high sensitivity as well as a reduction in false positive rate. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Incorporating Potential Environmental Impact from Water for Injection in Environmental Assessment of Monoclonal Antibody Production by A., Idris, Chua, Gek Kee, Mohamad Rizza, Othman

    Published 2016
    “…The PEI of these pollutants was estimated based on a modified Waste Reduction (WAR) Algorithm. For data generation, MED was simulated in SuperPro Designer®. …”
    Get full text
    Get full text
    Get full text
    Article