Search Results - (( web application ((amh algorithm) OR (acs algorithm)) ) OR ( _ application out algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Voting algorithms for large scale fault-tolerant systems by Karimi, Abbas

    Published 2011
    “…To do so, we have introduced a new sequential m-out-of-n algorithm with prediction ability which is known as enhanced m-out-of-n voter. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…The project was planned using the Kanban development methodology, and was built using HTML, CSS, JavaScript, Django, NumPy and pandas. The completed web application is then hosted on Heroku. k-luster allows users to upload their own data set, or choose from one of three samples if they just want to try out the application. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Optimal power flow using the Jaya algorithm by Warid, Warid, Hizam, Hashim, Mariun, Norman, Abdul Wahab, Noor Izzri

    Published 2016
    “…Statistical analysis is also carried out to check the reliability of the Jaya algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Development and applications of metaheuristic algorithms in engineering design and structural optimization / Ali Sadollah by Ali, Sadollah

    Published 2013
    “…In this thesis, the applications of a number of well-known metaheuristic algorithms for solving engineering problems have been considered. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Implication of image processing algorithm in remote sensing and GIS applications by Pathan, Mubeena, Jusoff, Kamaruzaman, Mohd Sood, Alias, Razali, Yaakob, Qureshi, Barkatullah

    Published 2011
    “…This paper generally analyzed and branch out algorithms to perceive their limitations and delimitation. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…However, the increased security breaches of recent mental health applications that leaked the patient's profile. This project proposed a virtual mental health mobile application, called TalkOut, with a lightweight message encryption algorithm to protect patient's profile, conversation messages and treatment history. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  17. 17
  18. 18

    Symbiotic organisms search optimization algorithm in cloud computing: a nature-inspired meta-heuristic by Sa'ad, Suleiman, Abdullah, Muhammed, Abdullah, Azizol, Ayob, Fahrul Hakim

    Published 2022
    “…This paper proposes to investigate symbiotic organisms search algorithms used in handling various optimisation problems in different fields to bring out strengths and weaknesses of the existing algorithms as well as to point out future directions for the upcoming studies in the domain. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Flower pollination algorithm for data generation and analytics - a diagnostic analysis by Odili, Julius Beneoluchi, Noraziah, Ahmad, Babalola, Asegunloluwa Eunice

    Published 2020
    “…The effectiveness of optimization in scientific and engineering applications has made optimization a popular area of scientific investigation in data generation and analytics leading to the design of several optimization algorithms. …”
    Get full text
    Get full text
    Get full text
    Article