Search Results - (( java application a algorithm ) OR ( data normalization ((path algorithm) OR (_ algorithm)) ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Even a normal people using clustering to grouping their data. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…One of the solutions is to have a security application implemented in mobile phone device. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Improved Dynamic Ant Colony System (DACS) on Symmetric Traveling Salesman Problem (TSP). by Md Rais, Helmi, Ali Othman, Zulaiha, Hamdan, Abdul Razak

    Published 2007
    “…Their ability as a colony to find paths or routes to the food sources has inspired the development of an algorithm namely Ant Colony System (ACS). …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Deadline guarantee for scientific workflow using dynamic scheduling algorithms on IaaS clouds by Alqaisy, Sarah Abdulrahman Shukur

    Published 2018
    “…We will conduct a simulation experiment of scientific workflow algorithms with both of the algorithms mentioned above. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A new hybrid multiaxial fatigue life model based on critical plane continuum damage mechanics and genetic algorithm by Masood, Kamal

    Published 2015
    “…The notion of characteristic profiles for the calibration of the model is also coherent with the application of equivalent fatigue loading in generating experimental data for calibration. The model is simple in application with the use of genetic algorithm for model calibration making use of only the material fatigue limit. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Improving Channel Assignment for Vehicular Ad-hoc Sensor Network in Disaster Management System by Chiu Shoon, Sia

    Published 2024
    “…Moreover, an average of 22.91% for LTE-AIC with respect to normal LTE-A and 38.63% compared to LTE for high data rate. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Intelligent motion planning of a mobile robot by using convolutional neural network / Siti Asmah Abdullah by Siti Asmah, Abdullah

    Published 2019
    “…By the path reference created by A* algorithm the robot is capable in optimizing its path to reach the designated destination. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms by Ridha, Hussein Mohammed

    Published 2020
    “…A new mutation vector inspired by the two-opposite path (2-Opt) algorithm with adaptive mutation scalar (F ) and crossover rate (CR) control parameters were employed to enhance the exploration and exploitation phases of the proposed algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Dynamics and control of underactuated systems with applications in robotics / Ahmad Azlan Mat Isa … [et al.] by Mat Isa, Ahmad Azlan

    Published 2011
    “…An ANN modal was trained using the experimentally obtained data and then used to predict the path of the passive joint that is positioned by the dynamic coupling of the active joint. …”
    Get full text
    Get full text
    Research Reports
  14. 14

    Investigating the reliability of machine learning algorithms as an advanced tool for ozone concentration prediction by Ayman Mohammed Shaher Yafouz, Mr.

    Published 2023
    “…The hybrid technique has been developed by using deep learning algorithms with the structure of multiple layers (with several neurons) of CNN and LSTM. …”
    text::Thesis
  15. 15

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Results: The programs were coded in Java computer language and implemented on Pentium PC. The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A smart marker-based indoor navigation system by Teoh, Zhen Quan

    Published 2024
    “…The proposed system also employs algorithms to calculate the shortest path for navigation and estimate the user position for localization when the user scans a marker. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17
  18. 18

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  19. 19
  20. 20

    Magnetic resonance imaging sense reconstruction system using FPGA / Muhammad Faisal Siddiqui by Muhammad Faisal , Siddiqui

    Published 2016
    “…Furthermore, variable databus widths are used in the data path of the proposed architecture, which leads to reducing the hardware cost and silicon area. …”
    Get full text
    Get full text
    Get full text
    Thesis