Search Results - (( developing validation technique algorithm ) OR ( java implementation case algorithm ))
Search alternatives:
- developing validation »
- validation technique »
- java implementation »
- implementation case »
- case algorithm »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
2
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
5
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
6
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article -
7
-
8
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
9
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
11
Optimisation of Environmental Risk Assessment Architecture using Artificial Intelligence Techniques
Published 2024“…This architecture is based on the combination of three well-known techniques, namely, artificial neural networks, fuzzy logic and genetic algorithm. …”
thesis::doctoral thesis -
12
Linear-pso with binary search algorithm for DNA motif discovery / Hazaruddin Harun
Published 2015“…The Linear-PSO algorithm was the first version of improvement. However due to the longer time required for complete execution of this algorithm, the Binary Search technique was integrated and a new version of the algorithm was developed, namely the Linear-PSO with Binary Search (LPBS) algorithm. …”
Get full text
Get full text
Thesis -
13
DEVELOPMENT OF A FATIGUE DAMAGE MONITORING SYSTEM USING DIGITAL IMAGE CORRELATION
Published 2017“…Next, validation works were carried out to verify the algorithm, imaging system and the digital image correlation (DIC) technique. …”
Get full text
Get full text
Thesis -
14
An intelligent framework for modelling and active vibration control of flexible structures
Published 2004“…The simulation algorithm and interactive environment thus developed and validated form suitable test and verification platforms for the development of AVC strategies for flexible structures as well as for learning and research purposes.…”
Get full text
Get full text
Get full text
Thesis -
15
Design and Development of Hybrid Maximum Power Point Tracking Algorithm for Photovoltaic Cell
Published 2013“…Moreover designed algorithm is developed using matlab and will be validate using real time data from the PV cell and the output will be compared with current algorithms.…”
Get full text
Get full text
Final Year Project -
16
Advanced data mining techniques for landslide susceptibility mapping
Published 2021“…This paper describes the development and validation of landslides susceptibility models for mountainous regions using advanced data mining techniques. …”
Get full text
Get full text
Article -
17
A Study On Gene Selection And Classification Algorithms For Classification Of Microarray Gene Expression Data
Published 2005“…The Performance Of The Combined Techniques Is Validated By Using Leave-One-Out Cross Validation (Loocv) Technique And Receiver Operating Characteristic (Roc) Is Used To Analyze The Results. …”
Get full text
Get full text
Get full text
Article -
18
Pemetaan Pm10 Dan Aot Menggunakan Teknik Penderiaan Jauh Di Semenanjung Malaysia
Published 2006“…The developed algorithms are two-band algorithm, terma linear and modified algorithm from the combination of the visible and infrared thermal bands. …”
Get full text
Get full text
Thesis -
19
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…In the implementation phase, Bubble Sort, Euclidean Distance, 10-Fold Cross validation, and K Nearest Neighbor algorithm are developed. …”
Get full text
Get full text
Thesis -
20
A Comparison Study On Pca_Modular Pca And Lda For Face Recognition
Published 2017“…Face recognition has been considered as a popular technique to recognise identity of a person. Many face recognition algorithms have been developed and modified by researchers. …”
Get full text
Get full text
Monograph
