Search Results - (( basic using group algorithm ) OR ( java implementation case algorithm ))
Search alternatives:
- java implementation »
- implementation case »
- group algorithm »
- case algorithm »
- basic using »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
5
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article -
6
-
7
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
8
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
10
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
11
Group consumers' preference recommendation algorithm model for online apparel's colour based on Kansei engineering
Published 2023“…Thus, this study took the colour design of men's plain-colour shirts as an example in China, established the basic colour calculation scale and an algorithm model of group consumers' product preferences based on Kansei Engineering and scientific mathematics, to provide new sales ideas and methods for retailers and markets online. …”
Get full text
Get full text
Get full text
Article -
12
A genetic similarity algorithm for searching the Gene Ontology terms and annotating anonymous protein sequences
Published 2008“…The genetic similarity algorithm is implemented in the Gene Ontology browser named basic UTMGO to overcome the weaknesses of the existing Gene Ontology browsers which use a conventional approach based on keyword matching. …”
Get full text
Get full text
Get full text
Article -
13
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…In this research, first the implementation of Analytical Hierarchy Process (AHP) computational tool was explored for deciding optimum material for automotive components. …”
Get full text
Get full text
Thesis -
14
Visualisation tool to study malaria transmission using network modelling
Published 2014“…Java was used to implement the visualisation tool. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
15
Basics of security and cryptography
Published 2014Get full text
Get full text
Get full text
Get full text
Get full text
Book Chapter -
16
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…The hashed keyword will be used in encrypt / decrypt process by using any of 3 encryption algorithm mentioned before. …”
Get full text
Get full text
Thesis -
17
A novel algorithm for collaborative behavior of multi-robot in autonomous reconnaissance
Published 2011“…A set of basic sharing behaviors for a group of hexapod robots is first assigned. …”
Get full text
Get full text
Get full text
Proceeding Paper -
18
CSC099: Foundation Computing II / Centre of Foundation Studies
Published 2022“…In addition, a high quality of academic exercises such as individual assignment and group project will be used to achieve these aims. …”
Get full text
Get full text
Get full text
Teaching Resource -
19
Interval-valued fuzzy soft topology and its applications in group decision-making problems
Published 2022“…In the application phase of this thesis, we provide a representation of the results acquired in the previous steps in order to compute and define various algorithms that assist group decision-making using interval-valued fuzzy soft sets. …”
Get full text
Get full text
Thesis -
20
The online mastermind game / Cheong Kuen Leion
Published 2003“…This game shows the basic concept that is used in solving problems.…”
Get full text
Get full text
Thesis
