Search Results - (( developing function new algorithm ) OR ( java implementation some algorithm ))
Search alternatives:
- developing function »
- java implementation »
- implementation some »
- some algorithm »
- new algorithm »
- function new »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
4
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
5
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
6
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
7
A block cipher based on genetic algorithm
Published 2016“…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
Get full text
Get full text
Get full text
Thesis -
8
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
9
-
10
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
11
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Semiparametric inference procedure for the accelarated failure time model with interval-censored data
Published 2019“…The main contribution of this research is developing statistical approaches, and introducing new algorithms and resampling methods for analysing interval-censored data through AFT models.…”
Get full text
Get full text
Get full text
Thesis -
13
Logic Programming In Radial Basis Function Neural Networks
Published 2013“…In this thesis also, I developed a new technique to extract the logic programming from radial basis function neural networks. …”
Get full text
Get full text
Thesis -
14
A new hybrid fuzzy ARTMAP and radial basis function neural network with online pruning strategy
Published 2023Conference Paper -
15
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
16
Computation of cryptosystem based on Lucas functions using addition chain
Published 2010“…New technique shows a smaller computation time compared to the existing algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
17
A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
Published 2004“…The new approach algorithm speed increment has consistently increased in between 18% to 22% microsecond for encryption and 30% to 34% for decryption compared to Rijndael algorithm.…”
Get full text
Get full text
Thesis -
18
New random approaches of modified adaptive bats sonar algorithm for reservoir operation optimization problems
Published 2024“…Generally, the average results indicates that the newly developed algorithm retrieved better than original MABSA in finding a minimum point which increment 5.833% better than original MABSA, and new algorithm retrieved 5.204% more better than global optimum value. …”
Get full text
Get full text
Thesis -
19
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…The issue is not only to develop new algorithms, but also to evaluate them on an experimental computational grid, using synthetic and real workload traces, along with the other existing job scheduling algorithms. …”
Get full text
Get full text
Thesis -
20
A new text-based w-distance metric to find the perfect match between words
Published 2020“…To improve the perfect-match calculation functionality in the traditional k-NN algorithm, a new similarity distance metric is developed and named as word-distance (w-distance). …”
Get full text
Get full text
Article
