Search Results - (( _ application testing algorithm ) OR ( its applications usage algorithm ))
Search alternatives:
- application testing »
- applications usage »
- testing algorithm »
- its applications »
- usage algorithm »
-
1
-
2
Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy
Published 2017“…In addition, CORDIC algorithm has a low usage of memory space compared to Look Up table (LUT) technique. …”
Get full text
Get full text
Student Project -
3
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Mostly, it attacks Android due to its popularity and high usage among end users. Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. …”
Proceedings Paper -
4
Automatic marking system for programming subject
Published 2023“…This project is a web application designed for lecturer that teaching programming subject to automatically mark programming algorithm exercise. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
6
-
7
Modelling and Optimization of Asymmetric Vehicle Routing Problem Using Particle Swarm Optimization Algorithm
Published 2021“…Specific optimization model and algorithm were developed to solve the problem. This intensive effort aims to reduce logistics costs and number of vehicle usage. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Design of a pattern classification system using extreme learning machine
Published 2024text::Final Year Project -
9
-
10
Design of a pattern classification system using extreme learning machine
Published 2023text::Final Year Project -
11
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…Popularity of P2P applications usage; majorly on file-sharing and video streaming has gained vast popularity and so rapid which wake up network service providers of its dominance. …”
Get full text
Get full text
Thesis -
12
Modelling of assembly line balancing with energy consumption
Published 2023“…The ALB with Energy Consideration (ALB-EC) was modelled into a mathematical model that could be used in solving the Simple Assembly Line Balancing Problem (SALBP), with the application of the Matlab application. The Particle Swarm Optimization (PSO) algorithm was applied and the model was tested by using three problems which consist of each of a small, medium, and large-sized test problem. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Photogrammetric unmanned aerial vehicle for digital terrain model estimation under oil palm tree canopy area / Suzanah Abdullah
Published 2021“…Following the application of a new methodology on the real site, the result indicated the consistency of DTM values of all the algorithms at different flying heights but there were relatively small differences between all the algorithms used. …”
Get full text
Get full text
Thesis -
14
Evaluation of UDP-based reliable transport protocols in wireless network: article / Madzirin Masirap
Published 2014“…The idea of wireless networking is interesting mainly because it introduce portability. For IoT application that require near real-time wireless connection, the traditional TCP protocol is not suitable because of its packet header size and its conservative Additive Increase Multiplicative Decrease (AIMD) congestion control algorithm and slow start strategy. …”
Get full text
Get full text
Article -
15
Evaluation of UDP-based reliable transport protocols in wireless network / Madzirin Masirap
Published 2014“…The idea of wireless networking is interesting mainly because it introduce portability. For IoT application that require near real-time wireless connection, the traditional TCP protocol is not suitable because of its packet header size and its conservative Additive Increase Multiplicative Decrease (AIMD) congestion control algorithm and slow start strategy. …”
Get full text
Get full text
Thesis -
16
A Hybrid Metaheuristic Technique Based on Grey Wolf Optimisation, Symbiotic Organism Search, and Ant Colony Optimisation for Solving Multi-Objective Vehicle Routing Problems
Published 2025“…The hybridisation mechanism combines the global exploration strength of GWO, the solution refinement capability of SOS, and the effective path construction of ACO into an integrated search strategy. The algorithm was first developed and tested using a standard benchmark dataset (Dantzig42), which was selected due to its standard usage in VRP research and its suitability for performance comparison owing to its structured complexity. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Cluster head selection algorithm using fuzzy logic in multi-tier Wireless Sensor Network for energy efficiency / Wan Isni Sofiah Wan Din
Published 2016“…Simulation based on 200 sensor nodes with 1 Joule energy deployed for testing the reliability of MAP. The performances of MAP are evaluated through comparing its energy usage for data transmission against Low Energy Adaptive Clustering Hierarchy (LEACH) and Stable Election Protocol (SEP). …”
Get full text
Get full text
Thesis -
18
AUTO-MANAGE PARKING SYSTEM (AMPS)
Published 2019“…The system able to recognize characters on number plate by using Automatic Number Plate Recognition (ANPR) technology which implement optical character recognition (OCR) algorithm to process the characters from images. User then able to pay parking fees by using mobile phone through android application linked with user’s number plate. …”
Get full text
Get full text
Final Year Project -
19
Scale-invariant and adaptive-search template matching for monocular visual odometry in low-textured environment
Published 2016“…Hence, the developed techniques and algorithms have high potential to be implemented in various commercial mobile robotic applications, which utilize VO for improved accuracy, efficiency, and cost effectiveness.…”
Get full text
Get full text
Thesis -
20
An efficient unknown detection approach for RFID data stream management system
Published 2025“…A novel algorithm called SWOR (Sliding Window XOR-based Detection) is introduced, specifically designed to identify unknown tags within RFID data streams. …”
Get full text
Get full text
Get full text
Article
