Search Results - (( developing ((test using) OR (code using)) algorithm ) OR ( java implementation case algorithm ))
Search alternatives:
- java implementation »
- implementation case »
- case algorithm »
- code using »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
3
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…The recent trend of software development uses OO paradigm. Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
Get full text
Get full text
Thesis -
4
Java based expert system for selection of natural fibre composite materials
Published 2013“…Computer oriented materials selection and knowledge-based expert systems are the prevailing approach in materials selection. In this paper, we develop a technology for the materials selection system using Java based expert system. …”
Get full text
Get full text
Get full text
Article -
5
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Secondly, an expert system using Java programming technology with two tiers of search engine was developed to perform a fast selection of candidate materials in huge volume. …”
Get full text
Get full text
Thesis -
6
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…The development process for this simulation is using programming language of Microsoft Visual C I t 6.0 and the coding creation depends on the algorithm flowchart and the formula pseudocode. …”
Get full text
Get full text
Thesis -
7
-
8
-
9
Detection of head position using chain code algorithm
Published 2007“…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
Get full text
Get full text
Thesis -
10
Detection of head position using chain code algorithm
Published 2007“…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
Get full text
Get full text
Thesis -
11
Steganography algorithm to hide secret message inside an image
Published 2011“…The proposed algorithm uses binary codes and pixels inside an image. …”
Get full text
Get full text
Article -
12
Study of optimal EG placement in radial distribution system using real coded genetic algorithm
Published 2011“…This method is developed in MATLAB. The IEEE‐69 bus system is utilized as a test case in this study.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Online Programming Judge System (UOJ)
Published 2013“…Moreover, the mechanism of test cases generation using PSO algorithm is deeply analyzed. …”
Get full text
Get full text
Final Year Project -
15
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
16
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Obfuscation is used to convert source code into a program that works the same way but is much harder to read and understand. …”
Get full text
Get full text
Thesis -
17
Development of Finite Element Code for Non-Linear Analysis of Interlocking Mortarless Masonry System
Published 2006“…This study aims at investigating numerically the structural response of interlocking masonry system using finite element method. The developed algorithm used in the FE analysis includes appropriate mathematical models to simulate the main features of mortarless masonry system. …”
Get full text
Get full text
Thesis -
18
-
19
Job recruiting system using sorting Algorithm / Adi Asyraf Ayob
Published 2020“…The functionality of the prototype was tested using Test Script while the usability testing was performed by collecting response from the system users about the usefulness, ease of use, and satisfaction. …”
Get full text
Get full text
Thesis -
20
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review
