Search Results - (( developing executable modified algorithm ) OR ( java implementation some algorithm ))
Search alternatives:
- developing executable »
- executable modified »
- java implementation »
- implementation some »
- some algorithm »
-
1
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Ideally, to perform regression testing is to re-execute all the test cases on the modified software. …”
Get full text
Get full text
Thesis -
2
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006Get full text
Get full text
Thesis -
5
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
6
Dynamic obstacle handling in multi-robot coverage
Published 2024“…This report focuses on developing a multi-robot coverage algorithm with dynamic obstacle handling abilities, known as the Modified Lloyd’s algorithm with Velocity Obstacle (VO). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Block backward differentiation formulas for solving first and second order fuzzy differential equations
Published 2016“…The algorithm of existing BBDF was modified into fuzzy version. …”
Get full text
Get full text
Get full text
Thesis -
8
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
9
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
10
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
11
Greedyzero-based scheduling algorithm to route in optical low stage interconnection networks
Published 2012“…This algorithm has been developed to achieve performance goals in terms of 50% reduction in the number of passes.…”
Get full text
Get full text
Thesis -
12
Modelling of multi-robot system for search and rescue
Published 2023“…This report focusses on developing a novel multi-robot path planning algorithm based on the Modified Particles Swarm Optimization (MPSO) algorithm for dynamic environments. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
14
M-Factors Fuzzy Time Series for Forecasting Moving Holiday Electricity Load Demand in Malaysia (S/O 14589)
“…The modified algorithm, Weighted Subsethood Segmented Fuzzy Time Series (WeSuSFTS) consists of four main phases; data pre-processing, model development, model implementation and model evaluation. …”
Get full text
Get full text
Monograph -
15
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
16
System identification using Extended Kalman Filter
Published 2017“…System identification is getting more intensive from researcher to develop an algorithm with work efficiently and more accurate. …”
Get full text
Get full text
Student Project -
17
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Development of optimization Alghorithm for uncertain non-linear dynamical system
Published 2004Get full text
Get full text
Monograph -
20
New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
Published 2009“…The new proposed system is able to embed information in an execution file without change the size of execution file. …”
Get full text
Get full text
Get full text
Article
