Search Results - (( developing factor selection algorithm ) OR ( java implementation some algorithm ))
Search alternatives:
- selection algorithm »
- java implementation »
- implementation some »
- developing factor »
- factor selection »
- some algorithm »
-
1
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
2
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
5
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
6
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
7
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
8
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
9
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
11
Advancements in crop water modelling: algorithmic developments and parameter optimization strategies for sustainable agriculture: a review
Published 2024“…Overall, this comprehensive review provides valuable insights into the importance of algorithm development, optimization, and parameter selection in crop water modelling, specifically focusing on crop factors, soil factors, and weather factors.…”
Get full text
Get full text
Get full text
Article -
12
Development of decentralized data fusion algorithm with optimized kalman filter.
Published 2016“…The proposed QR-FA algorithm is developed by introducing additional step of QR decomposition in the standard factor analysis algorithm. …”
Get full text
Get full text
Thesis -
13
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…In excel, a graph has been produced to show the minimum and maximum values of the new dynamic quantum time after setting the parameters of the proposed formula (priority, burst time and the current quantum time). The proposed algorithms (Priority Dynamic Quantum Time and Multi Priority Dynamic Quantum Time Algorithms) are implemented using JAVA programming language and validated using Key Performance Indicators equations. …”
Get full text
Get full text
Thesis -
14
Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms
Published 2005“…In addition, the best band selected for image classification is not necessarily the best for classification.A Best Band Selection Index (BBSI) algorithm was developed which is capable of selecting the best band combination for image visualization and supervised classification. …”
Get full text
Get full text
Thesis -
15
Development Of Fall Risk Clustering Algorithm In Older People
Published 2020“…Therefore, the aim of this study is to develop a clustering-based fall risk algorithm which can provide assistances for clinician in management of falls. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Intership supervisor selection using genetic algorithms
Published 2015“…By using genetic algorithm approach, the priority factors for the assigning faculty supervisor to internship student has been identified and also development model of selection has been done to fulfill the criteria for the selection specified by the FTMK. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Successor selection for Ant Colony Optimization technique algorithm / Muhammad Iskandar Isman
Published 2017“…A successor with has highest value criteria such as experiences, skills, qualification are qualified to be a candidate replacement of leadership. Selecting a successor is used subjective criteria to evaluate in higher learning of successor based on the following factors. …”
Get full text
Get full text
Thesis -
18
Random forest algorithm for co2 water alternating gas incremental recovery factor prediction
Published 2020“…RF develops multiple decision trees based on the random selection of the input data and random selection of the variables. …”
Get full text
Get full text
Article -
19
Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System
Published 2020“…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
Get full text
Get full text
Get full text
Article -
20
The use of Cox regression and genetic algorithm (CoRGA) for identifying risk factors for mortality in older people
Published 2004“…Further research is seeking to develop the program further and to identify further risk factors for all-cause mortality in older people.…”
Get full text
Get full text
Get full text
Article
