Search Results - (( developing effective normalization algorithm ) OR ( java implementation case algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4
  5. 5

    Java based expert system for selection of natural fibre composite materials by Ahmed Ali, Basheer A., Salit, Mohd Sapuan, Zainudin, Edi Syams, Othman, Mohamed

    Published 2013
    “…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
    Review
  8. 8

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  11. 11

    The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer by Ahmad, Noor Ashikin

    Published 2015
    “…Purpose: To identify the effect of dose calculation algorithms on the Normal Tissue Complication Probability values of thoracic cancer. …”
    Get full text
    Get full text
    Monograph
  12. 12

    Towards the utilization of normalized LMS algorithm in adaptive filter by Misbah Emhammed, Misbah Abdelsalam, Ho, Yih Hwa

    Published 2014
    “…In this paper, we focused on how the development of algorithms helped reduce the level of noise. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…In this research, first the implementation of Analytical Hierarchy Process (AHP) computational tool was explored for deciding optimum material for automotive components. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Semi-automatic cortical boundary detection / Noor Elaiza Abdul Khalid. by Abdul Khalid, Noor Elaiza

    Published 2010
    “…LPHA proves to be an efficient edge detector evaluation algorithm and FPSO is proven to be an effective edge detection algorithm.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Visualisation tool to study malaria transmission using network modelling by Wong,, Ji Yeh

    Published 2014
    “…Java was used to implement the visualisation tool. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  16. 16

    Analysis of tumour control probability, normal tissue complication probability and isotoxic effects for prostate cancer by Fauzee, Nurnada Syahrain Mohd

    Published 2016
    “…The treatment plans were then recalculated using Pencil Beam algorithm and similar TCP, NTCP and isotoxic effects were evaluated. …”
    Get full text
    Get full text
    Monograph
  17. 17

    Spectral discrimination and index development of roofing materials and conditions using field spectroscopy and worldview-3 satellite image by Samsudin, Sarah Hanim

    Published 2016
    “…Spectral index of NDCCI and NDMCI found to be effective in providing roof degradation status map in effective time-manner and parameter-free algorithm compared to normal supervised classification scheme. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Hardware Simulator for Seizure, Preseizure and Normal Mode Signal Generation in LabVIEW Environment for Research by Qidwai, Uvais, Malik, Aamir Saeed, Shakir, Mohamed, Kamel, Nidal

    Published 2013
    “…This simulator can simulate or generate seizure, pre-seizure and normal EEG waveform. The paired cost effective Arduino microcontroller (in case of wireless system) will be having the algorithm in built in order to classify the type of signal received. …”
    Get full text
    Get full text
    Get full text
    Non-Citation Index Journal
  19. 19

    A new method for intermediate power point tracking for PV generator under partially shaded conditions in hybrid system by Guichi, Amar, Talha, Abdelaziz, Berkouk, El Madjid, Mekhilef, Saad, Gassab, Samir

    Published 2018
    “…This technique is based on the combination of two algorithms, the particle swarm optimization algorithm for tracking the global maximum power point, while a newly developed algorithm is used for attaining any other supervisory control set point. …”
    Get full text
    Get full text
    Article
  20. 20

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis