Search Results - (( develop computer modified algorithm ) OR ( java implementation some algorithm ))
Search alternatives:
- java implementation »
- implementation some »
- computer modified »
- develop computer »
- some algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…There is also a need to consider implementing this strategy for dynamic object-oriented languages such as Python, Lisp, and Smalltalk.…”
Get full text
Get full text
Thesis -
4
Evaluation of structured questions using modified BLEU algorithm
Published 2016Get full text
Get full text
Get full text
Article -
5
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
6
Local Stereo Matching Algorithm Using Modified Dynamic Cost Computation
Published 2021“…This approach utilised modified dynamic cost computation in the matching cost. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Estimation of the denitrification in the lower Mississippi Valley
Published 2001Get full text
Get full text
Conference or Workshop Item -
8
Optimized clustering with modified K-means algorithm
Published 2021“…Generally, the proposed modified k-means algorithm is able to determine the optimum number of clusters for huge data.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
-
10
Analysis and Modification of Grain - 128 Stream Cipher Algorithm
Published 2024thesis::master thesis -
11
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
12
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Bats echolocation-inspired algorithms for global optimisation problems
Published 2016Get full text
Get full text
Thesis -
15
Dynamic obstacle handling in multi-robot coverage
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
17
Modified multi-verse optimizer for solving numerical optimization problems
Published 2020Get full text
Get full text
Conference or Workshop Item -
18
Modified firefly algorithm for directional overcurrent relay coordination in power system protection / Muhamad Hatta Hussain
Published 2020“…The objectives of the studies are to develop a new optimization technique termed as Modified Firefly Algorithm (MFA) for minimizing the relay operating time, to develop a Multi-Objective Modified Firefly Algorithm (MOMFA) for minimizing both the total relay operating time and relay coordination time and to develop an integrated optimal predictor termed as Modified Firefly Algorithm-Artificial Neural Network (MFA-ANN) for accurate prediction of relay operating time. …”
Get full text
Get full text
Thesis -
19
-
20
Modified word representation vector based scalar weight for contextual text classification
Published 2024“…To validate this algorithm, the modified word vectors are compared with original LLM-generated word vectors to evaluate their reflection of the intended context. …”
Get full text
Get full text
Get full text
Thesis
