Search Results - (( based replication learning algorithm ) OR ( java implementation success algorithm ))

Refine Results
  1. 1

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    An approach for cross-site scripting detection and removal based on genetic algorithms. by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia

    Published 2014
    “…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Cross-site scripting detection based on an enhanced genetic algorithm by Hydara, Isatou, Md Sultan, Abu Bakar, Zulzalil, Hazura, Admodisastro, Novia Indriaty

    Published 2015
    “…The proposed approach is, so far, only implemented and validated on Java-based Web applications, although it can be implemented in other programming languages with slight modifications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Path planning for unmanned aerial vehicle (UAV) using rotated accelerated method in static outdoor environment by Shaliza Hayati A. Wahab, Nordin Saad, Azali Saudi, Ali Chekima

    Published 2021
    “…In this study, a fast iterative method known as Rotated Successive Over-Relaxation (RSOR) is introduced. The algorithm is implemented in a self-developed 2D Java tool, UAV Planner. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Rockfall source identification using a hybrid Gaussian mixture-ensemble machine learning model and LiDAR data by Fanos, Ali Mutar, Pradhan, Biswajeet, Mansor, Shattri, Md Yusoff, Zainuddin, Abdullah, Ahmad Fikri, Jung, Hyung Sup

    Published 2019
    “…The availability of high-resolution laser scanning data and advanced machine learning algorithms has enabled an accurate potential rockfall source identification. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…In excel, a graph has been produced to show the minimum and maximum values of the new dynamic quantum time after setting the parameters of the proposed formula (priority, burst time and the current quantum time). The proposed algorithms (Priority Dynamic Quantum Time and Multi Priority Dynamic Quantum Time Algorithms) are implemented using JAVA programming language and validated using Key Performance Indicators equations. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…A prototype of a mobile robot based on Lego successfully implemented by using PIC and can be controlled through voice recognition. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR) by Chowdhury Sajadul Islam

    Published 2026
    “…Upon converting PE files to images, the deep learning pixel-matching algorithm identifies obscured malware features. …”
    thesis::doctoral thesis
  13. 13

    A Novel Wrapper-Based Optimization Algorithm for the Feature Selection and Classification by Talpur, N., Abdulkadir, S.J., Hasan, M.H., Alhussian, H., Alwadain, A.

    Published 2023
    “…The SCSO algorithm replicates the hunting and searching strategies of the sand cat while having the advantage of avoiding local optima and finding the ideal solution with minimal control variables. …”
    Get full text
    Get full text
    Article
  14. 14

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A sequential handwriting recognition model based on a dynamically configurable convolution recurrent neural network and hybrid salp swarm algorithm by Ahmed Ali Mohammed, Al-saffar

    Published 2024
    “…The built DCCRNN is based on the Salp Swarm optimization Algorithm (SSA), a processor that given a particular dataset will find the best CRNN’s structure and hyperparameters. …”
    Get full text
    Get full text
    Thesis
  16. 16

    HARC-New Hybrid Method with Hierarchical Attention Based Bidirectional Recurrent Neural Network with Dilated Convolutional Neural Network to Recognize Multilabel Emotions from Text by Islam, Md Shofiqul, Sultana, Sunjida, Debnath, Uttam Kumar, Al Mahmud, Jubayer, Islam, S. M. Jahidul

    Published 2021
    “…On a variety of datasets, our proposed HARC algorithm solution outperformed traditional machine learning approaches as well as comparable deep learning models by a margin of 1%. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    A Novel Path Prediction Strategy for Tracking Intelligent Travelers by Motlagh, Omid Reza Esmaeili

    Published 2009
    “…The FCM nodes are a novel selection of kinematical factors. Genetic algorithm (GA) is then used to train the FCM to be able to replicate the decisional behaviors of the intelligent traveler. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…To achieve these objectives, the system adopts the Rapid Application Development (RAD) methodology, ensuring iterative design, prototyping, and user feedback integration throughout the process. The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Securing IoT networks using machine learning-resistant physical unclonable functions (PUFs) on edge devices by Sheikh, Abdul Manan, Islam, Md. Rafiqul, Habaebi, Mohamed Hadi, Zabidi, Suriza Ahmad, Najeeb, Athaur Rahman, Baloch, Mazhar

    Published 2026
    “…The predictive performance of five machine learning algorithms, i.e., Support Vector Machines, Logistic Regression, Artificial Neural Networks with a Multilayer Perceptron, K-Nearest Neighbors, and Gradient Boosting, was analyzed, and the results showed an average accuracy of approximately 60%, demonstrating the strong resistance of the RO PUF to these attacks. …”
    Get full text
    Get full text
    Get full text
    Article