Search Results - (( developing special function algorithm ) OR ( java implementation best algorithm ))
Search alternatives:
- java implementation »
- implementation best »
- developing special »
- function algorithm »
- special function »
- best algorithm »
-
1
Route Optimization System
Published 2005“…I will be concentrating on finding the best algorithm for calculating the shortest distance between two points on a digital map. …”
Get full text
Get full text
Final Year Project -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
3
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The support vector machines (SVM) algorithm obtained the overall best results of 94.5% accuracy, 91.8% precision, 91.7% recall, and 91.1% f-Measure while the naïve bayes (NB) algorithm obtained the best AUC score of 0.944 with the tweet data of Dato Seri Anwar. …”
Get full text
Get full text
Get full text
Thesis -
4
A web-based implementation of k-means algorithms
Published 2022“…Firstly, k-luster could incorporate additional clustering algorithms, or even classification algorithms in the future. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
7
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
9
Computation of cryptosystem based on Lucas functions using addition chain
Published 2010“…Cryptosystem based on Lucas Functions is known as LUC Cryptosystem. Lucas Functions are the special form of second-order linear recurrence relation using a large public integer as modulus. …”
Get full text
Get full text
Conference or Workshop Item -
10
A hybrid SP-QPSO algorithm with parameter free adaptive penalty method for constrained global optimization problems
Published 2018“…Most real-life optimization problems involve constraints which require a specialized mechanism to deal with them. The presence of constraints imposes additional challenges to the researchers motivated towards the development of new algorithm with efficient constraint handling mechanism. …”
Get full text
Get full text
Get full text
Article -
11
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
Get full text
Get full text
Thesis -
12
A new cryptosystem analogous to LUCELG and Cramer-Shoup
Published 2009“…Since the encryption and decryption algorithm of a new cryptosystem is based on the defined Lucas function, it is believed that the security of Lucas function is polynomial-time equivalent to the generalized discrete logarithm problems. …”
Get full text
Get full text
Get full text
Article -
13
Seed disperser ant algorithm for optimization / Chang Wen Liang
Published 2018“…The Seed Disperser Ant Algorithm (SDAA) is developed based on the evolution or expansion process of Seed Disperser Ant (Aphaenogaster senilis) colony. …”
Get full text
Get full text
Get full text
Thesis -
14
Block multistep methods for solving first order retarded and neutral delay differential equations
Published 2015“…The numerical solution of RDDE is then extended for solving the neutral delay differential equations (NDDE) of non-discontinuity and discontinuity cases. A new subroutine function has been added in the developed algorithm with the capabilities to approximate the neutral delay term using the interpolation of function evaluation. …”
Get full text
Get full text
Thesis -
15
RISC-V instruction set extension on blockchain application
Published 2024“…One of the most common cryptographic algorithms used in blockchain would be selected in this paper, typically djb2 hash algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Extraction of Inherent Frequency Components of Multiway EEG Data Using Two-Stage Neural Canonical Correlation Analysis
Published 2014“…This provides a great opportunity in analyzing brain-body function.…”
Get full text
Get full text
Get full text
Article -
17
Alternative method for economic dispatch utilizing grey wolf optimizer
Published 2015“…Although several optimization methodologies have been developed for solving ED problems, the complexity of the task reveals the necessity for development of efficient algorithms to accurately locate the optimum solution. …”
Get full text
Get full text
Thesis -
18
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Efficient Clustering Method
Published 2010“…The proposed architecture is more scalable and proposed algorithm is robustness against even/uneven node deployment.…”
Get full text
Get full text
Citation Index Journal -
19
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Therefore tests can be conducted as you develop the system. From tests, it was observed that all functions perfectly, accurately, and swiftly, indicating the advantages of an E-Certificate system.…”
Get full text
Get full text
Thesis -
20
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…WebDID is an alternative method to protect web server by detecting unauthorised changes in web and sending an intrusion alarm directly to web server administrator. Hashing function implementation have been using in this system as its cryptography algorithm. …”
Get full text
Get full text
Monograph
