Search Results - (( developing solving delay algorithm ) OR ( java detection using algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    One-step block methods for solving ordinary and delay differential equations by Mohd Radzi, Hazwani

    Published 2011
    “…A new modified algorithm from the existing program for solving ODEs was developed. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Block multistep methods for solving first order retarded and neutral delay differential equations by Abdul Aziz, Nurul Huda

    Published 2015
    “…A new subroutine function has been added in the developed algorithm with the capabilities to approximate the neutral delay term using the interpolation of function evaluation. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Predictor-corrector scheme in modified block method for solving delay differential equations with constant lag by Abdul Aziz, Nurul Huda, Abdul Majid, Zanariah, Ismail, Fudziah

    Published 2014
    “…In this developed algorithm, each coefficient in the predictor and corrector formula are recalculated when the step size changing. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Predictor-corrector scheme in modified block method for solving delay differential equations with constant lag by Nurul Huda Abdul Aziz, Zanariah Abdul Majid, Fudziah Ismail

    Published 2014
    “…In this developed algorithm, each coefficient in the predictor and corrector formula are recalculated when the step size changing. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Development of a two-level trade credit model with shortage for deteriorating products using hybrid metaheuristic algorithm by Molamohamadi, Zohreh

    Published 2015
    “…This proves the capability of the developed hybrid algorithm in solving the formulated model.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Solving delay differential equations (DDEs) using nakashima's 2 stages 4th order Pseudo-Runge-Kutta method by Ayunni Sarbi N.A., Bin Mamat M.B.

    Published 2013
    “…This paper is investigate numerically the problem on solving Delay Differential Equations (DDEs) using Nakashima’s 2 Stages 4th Order Pseudo-Runge-Kutta Method and also developed the algorithm of Nakashima’s 2 Stages 4th Order Pseudo-Runge-Kutta Method incorporates with Hermite Interpolation. …”
    Get full text
    Non-Indexed Article
  9. 9

    Multistep block methods for solving higher order delay differential equations by Hoo, Yann Seong

    Published 2016
    “…This thesis describes the development of numerical algorithms for solving higher order DDEs. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Adam’s type block methods for solving neutral delay differential equation with constant and panthograph delay by Ismail, Nur Inshirah Naqiah

    Published 2019
    “…The block methods have also produced less computational time in solving NDDE with con- stant and pantograph delay types.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Numerical solution of delay differential equation using two-derivative Runge-Kutta type method with Newton interpolation by Senu, N., Lee, K. C., Ahmadian, A., Ibrahim, S. N. I.

    Published 2022
    “…Numerical approach of two-derivative Runge-Kutta type method with three-stage fifth-order (TDRKT3(5)) is developed and proposed for solving a special type of third-order delay differential equations (DDEs) with constant delay. …”
    Get full text
    Get full text
    Article
  12. 12

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Diagonally multistep block method for solving Volterra integro-differential equation with delay by Baharum, Nur Auni, Abdul Majid, Zanariah, Senu, Norazak, Rosali, Haliza

    Published 2023
    “…Volterra integro-differential equation with delay (VIDED) is solved using a diagonally multistep block method (DMB). …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    An enhanced mobile internet protocol version 6 (IPv6) with multicast function and hierarchical design. by Khatun, Sabira

    Published 2006
    “…Mobile IPv6 mechanism requires some handover algorithm when it changes its point of attachment in the Internet.An enhanced micro mobility handover algorithm is developed on top of mobile IPv6. …”
    Get full text
    Patent
  16. 16

    Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti by Abdul Shauti, Noor Azliza

    Published 2008
    “…By using this identification, it can simulate in flexible images post processing and analysis in easy image management using Java aplication. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Fitness value based evolution algorithm approach for text steganalysis model by Din, Roshidi, Samsudin, Azman, Tuan Muda, Tuan Zalizam, Lertkrai, P., Amphawan, Angela, Omar, Mohd Nizam

    Published 2013
    “…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
    Get full text
    Get full text
    Article
  20. 20