Search Results - (( _ applications need algorithm ) OR ( its application a algorithm ))

Refine Results
  1. 1
  2. 2

    Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm by ,, Dwi Pebrianti, Ann Ayop azmi, Nurnajmi Qasrina, Bayuaji, Luhur, Suarin, Nur Aisyah Syafinaz, ,, Muhammad Syafrullah

    Published 2022
    “…The performance of these algorithms will be compared with a well-known optimization algorithm, Particle Swarm Optimization (PSO). …”
    Get full text
    Get full text
    Book Chapter
  3. 3

    A standard deviation selection in evolutionary algorithm for grouper fish feed formulation by Soong, Cai Juan, Ramli, Razamin, Abdul Rahman, Rosshairy

    Published 2016
    “…Malaysia is one of the major producer countries for fishery production due to its location in the equatorial environment.Grouper fish is one of the potential markets in contributing to the income of the country due to its desirable taste, high demand and high price.However, the demand of grouper fish is still insufficient from the wild catch.Therefore, there is a need to farm grouper fish to cater to the market demand.In order to farm grouper fish, there is a need to have prior knowledge of the proper nutrients needed because there is no exact data available.Therefore, in this study, primary data and secondary data are collected even though there is a limitation of related papers and 30 samples are investigated by using standard deviation selection in Evolutionary algorithm.Thus, this study would unlock frontiers for an extensive research in respect of grouper fish feed formulation.Results shown that the fitness of standard deviation selection in evolutionary algorithm is applicable.The feasible and low fitness, quick solution can be obtained. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    A Review on the Recent Application of Jaya Optimization Algorithm by Alsajri, Mohammad, Mohd Arfian, Ismail, Abdul-Baqi, Saba

    Published 2019
    “…The important difference between Jaya and other optimization algorithms is that Jaya does not require the tuning of its parameters (a process needed in the other algorithms to escape unwanted convergence). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK by NURSHAZLINA SUHAIMY

    Published 2023
    “…This enables smart grid to communicate with each of its devices and applications in monitoring and controlling the components remotely. …”
    text::Thesis
  7. 7

    A Standard Deviation Selection in Evolutionary Algorithm for Grouper Fish Feed Formulation by Soong, Cai Juan, Razamin, Ramli, Rosshairy, Abdul Rahman

    Published 2016
    “…Results shown that the fitness of standard deviation selection in evolutionary algorithm is applicable. The feasible and low fitness, quick solution can be obtained. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Modifying iEclat algorithm for infrequent patterns mining by Julaily Aida, J., Mustafa, M.

    Published 2018
    “…A few parts of this algorithm need a modification to assure that it is suitable for mining infrequent pattern. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    A new vertical edge detection algorithm and its application by Al-Ghaili, Abbas Mohammed Ali, Mashohor, Syamsiah, Ismail, Alyani, Ramli, Abdul Rahman

    Published 2008
    “…The need to distinguish the desired details is a very important pre-process in order to give good results in short time processing. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Parallel genetic algorithms for shortest path routing in high- performance computing / Mohd Erman Safawie Che Ibrahim by Che Ibrahim, Mohd Erman Safawie

    Published 2012
    “…Nowadays, there are a lot of applications that affect the speedup of a computer which reduce its performance. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Ant colony optimization algorithm for dynamic scheduling of jobs in computational grid by Ku-Mahamud, Ku Ruhana, Ramli, Razamin, Yusof, Yuhanis, Mohamed Din, Aniza, Mahmuddin, Massudi

    Published 2012
    “…Job scheduling problem is classified as an NP-hard problem.Such a problem can be solved only by using approximate algorithms such as heuristic and meta-heuristic algorithms.Among different optimization algorithms for job scheduling, ant colony system algorithm is a popular meta-heuristic algorithm which has the ability to solve different types of NP-hard problems.However, ant colony system algorithm has a deficiency in its heuristic function which affects the algorithm behavior in terms of finding the shortest connection between edges.This research focuses on a new heuristic function where information about recent ants’ discoveries has been considered.The new heuristic function has been integrated into the classical ant colony system algorithm.Furthermore, the enhanced algorithm has been implemented to solve the travelling salesman problem as well as in scheduling of jobs in computational grid.A simulator with dynamic environment feature to mimic real life application has been development to validate the proposed enhanced ant colony system algorithm. …”
    Get full text
    Get full text
    Monograph
  13. 13

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Thesis
  14. 14

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16
  17. 17
  18. 18

    Iterative methods for solving split common fixed point problems in Hilbert spaces by Mohammed, Lawan Bulama

    Published 2016
    “…To determine the norm of this bounded linear operator is a tough task. In this regard, we consider an algorithm for solving such a problem which does not need any prior information on the norm of the bounded linear operator and establish the convergence results of the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    University class timetable tool by Ang, Wen Jie

    Published 2022
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail by Che Ismail, Suhaila

    Published 1998
    “…Each mobile IP agent needs a different application and independently configured. …”
    Get full text
    Get full text
    Thesis