Search Results - (( developing agent efficient algorithm ) OR ( java detection using algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    AGENT MEETING SCHEDULER by ZAINAL ABIDIN, NURAINI

    Published 2011
    “…An agent meeting scheduler prototype then will be developed to prove that the selected algorithm is working properly. …”
    Get full text
    Get full text
    Final Year Project
  5. 5
  6. 6

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti by Abdul Shauti, Noor Azliza

    Published 2008
    “…By using this identification, it can simulate in flexible images post processing and analysis in easy image management using Java aplication. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Fitness value based evolution algorithm approach for text steganalysis model by Din, Roshidi, Samsudin, Azman, Tuan Muda, Tuan Zalizam, Lertkrai, P., Amphawan, Angela, Omar, Mohd Nizam

    Published 2013
    “…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Enhanced multi-agent approaches for efficient evacuation and rescue operations in managing disasters by Abusalama, Jawad

    Published 2025
    “…Building on the proposed algorithm and approaches, Agent-Based Simulation (ABS) models were developed to evaluate both evacuation and rescue operations in Al-Aqsa Mosque (AM) scenarios in Palestine. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Automated bilateral negotiation with incomplete information in the e-marketplace. by Jazayeriy, Hamid

    Published 2011
    “…Moreover, results indicate that agents equipped by this learning capability can generate Pareto-efficient offers by MGT algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Three-dimensional coverage control for multi-unmanned aerial vehicle by Siow, Wen Hao

    Published 2024
    “…The Multi-step Broadcast Control (MBC) scheme emerges as a key reference due to its effectiveness in scalability and computational efficiency. This study proposes a 3D coverage control algorithm to address complex real-world scenarios, wherein the 3D control algorithm will be developed based on the 2D MBC scheme. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Network routing by mobile agents for image retrieval using fuzzy genetic algorithms by Selamat, Ali, Selamat, Mohd. Hafiz, Bakri, Aryati, Sulaiman, Sarina, Selamat, Fatimah @ Salwa, Mohd. Daud, Mariah

    Published 2005
    “…This should be done in an efficient way by minimizing the elapsed time. Usually these agents only know the list of sites but not the distance s between them. …”
    Get full text
    Get full text
    Monograph
  16. 16
  17. 17
  18. 18
  19. 19

    Intelligent multi-objective control and management for smart energy efficient buildings by Shaikh, P.H., Nor, N.B.M., Nallagownden, P., Elamvazuthi, I., Ibrahim, T.

    Published 2016
    “…The challenging task of building controls is to achieve indoor building environment comfort with improved energy efficiency. In this study, multi-agent control system has been developed in combination with stochastic intelligent optimization. …”
    Get full text
    Get full text
    Article
  20. 20

    Intelligent multi-objective control and management for smart energy efficient buildings by Shaikh, P.H., Nor, N.B.M., Nallagownden, P., Elamvazuthi, I., Ibrahim, T.

    Published 2016
    “…The challenging task of building controls is to achieve indoor building environment comfort with improved energy efficiency. In this study, multi-agent control system has been developed in combination with stochastic intelligent optimization. …”
    Get full text
    Get full text
    Article