Search Results - (( data replication testing algorithm ) OR ( java implementation search algorithm ))
Search alternatives:
- implementation search »
- replication testing »
- java implementation »
- testing algorithm »
-
1
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
Get full text
Get full text
Journal -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
A novel deadlock detection algorithm for neighbour replication on grid environment
Published 2012“…The aim of this research is to handle the deadlock problem in NRG to preserve the consistency of data and increase the throughput. The NRGDD simulation model has been developed to test the algorithm on NRG. …”
Get full text
Get full text
Thesis -
5
Songs Search Using Human Humming Voice
Published 2007Get full text
Get full text
Final Year Project -
6
Visualisation tool to study malaria transmission using network modelling
Published 2014“…In addition, the Hypertext Induced Topical Search (HITS) web search algorithm was adapted to implement a search engine, which uses the bipartite contact network as the input. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
7
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Initially, this tool adopts only Crow Search, Jaya, and Sine Cosine algorithms. But more metaheuristics will be included in future research. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
10
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Secondly, an expert system using Java programming technology with two tiers of search engine was developed to perform a fast selection of candidate materials in huge volume. …”
Get full text
Get full text
Thesis -
11
Exploration of machine learning forecasting methods in M4 competition / Muhammad Halim Hamdan and Shuzlina Abdul-Rahman
Published 2021“…Each technique was replicated, trained and tested accordingly. M4 competition dataset was used in this research, with 100,000 time series data and multiple data frequency, which is enough to replicate the real-world situation. …”
Get full text
Get full text
Get full text
Article -
12
Finite element modeling and updating for dynamic study of exhaust structure
Published 2020“…Hence, this paper is carried out to reduce the discrepancies between numerical prediction results with measured test data on FE model of exhaust structure by implementing FE model updating using SOL200 algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Rockfall source identification using a hybrid Gaussian mixture-ensemble machine learning model and LiDAR data
Published 2019“…Moreover, the proposed model has achieved the optimal prediction accuracies (92%) on the basis of testing data, thereby indicating that the model can be generalised and replicated in different regions, and the proposed method can be applied to various landslide studies.…”
Get full text
Get full text
Get full text
Article -
14
A Novel Wrapper-Based Optimization Algorithm for the Feature Selection and Classification
Published 2023“…Additionally, the Wilcoxon rank test was used to perform the significance analysis between the proposed SCSOKNN method and six other algorithms for a p-value less than 5.00E-02. …”
Get full text
Get full text
Article -
15
Enhancing clustering algorithm with initial centroids in tool wear region recognition
Published 2020“…K-means clustering has become the most applied algorithm in discovering classes in an unsupervised scenario. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The recommendation services provided reduce users burden from manual browsing and searching for knowledge reference resources. KSFaci is embedded in web environment and is implemented using Java Servlet and runs under Apache server. …”
Get full text
Get full text
Thesis -
17
Securing IoT networks using machine learning-resistant physical unclonable functions (PUFs) on edge devices
Published 2026“…The NIST statistical test suite was applied to the CRP data of the RO PUF to evaluate its randomness quality. …”
Get full text
Get full text
Get full text
Article -
18
A self-adaptive agent-based simulation modelling framework for dynamic processes
Published 2023“…Case studies for simulating dynamic processes of new student registration (administrative domain), transport request (transportation domain) and crime investigation (security domain) with real data collected through interview and document reviews to test the proposed idea. …”
text::Thesis -
19
Finger-Vein Biometric Identification Using Convolutional Neural Network
Published 2016“…An identification rate of 100.00% is achieved, with an 80/20 percent ratio for separation of training and test samples, respectively. An additional number of subjects have also been tested, in which for 81 subjects an accuracy of 99.38% is achieved.…”
Get full text
Get full text
Get full text
Article -
20
Access control model based on trust, purpose, and role in materialized view for privacy protection
Published 2019“…This study focuses on data privacy protection in materialized view. Materialized view is a replica of a table which is created in a very large system where data are replicated from the master tables. …”
Get full text
Get full text
Thesis
