Search Results - (( development program interception algorithm ) OR ( java a reflection algorithm ))

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    Methods of aircraft trajectory optimisation in air combat by Nusyirwan, Istas Fahrurrazi, Bil, Cees

    Published 2007
    “…An algorithm has been developed and implemented using Evolutionary Programming. …”
    Get full text
    Get full text
    Article
  2. 2

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Optimal Real Time Evasion against High Speed Pursuer Using Evolutionary Programming by Nusyirwan, Istas F., Bil, Cees

    Published 2006
    “…The pursuer simply home-in to the evader and the evader follows the trajectory suggested from the algorithm. In both scenarios, the evader is able to steer itself from interception.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Mapreduce algorithm for weather dataset by Khalid Adam, Ismail Hammad

    Published 2017
    “…This original dataset is stored in Hadoop Distributed File System. Next, MapReduce Algorithm is developed using Java programming. The algorithm is tested using small and big dataset. …”
    Get full text
    Get full text
    Thesis
  5. 5

    MapReduce algorithm for weather dataset by Majid, Mazlina A., Romli, Awanis, Ahmad, Noraziah, Hammad, Khalid Adam Ismail

    Published 2018
    “…This original dataset is stored in Hadoop Distributed File System. Next, MapReduce Algorithm is developed using Java programming. The algorithm is tested using small and big dataset. …”
    Get full text
    Get full text
    Research Report
  6. 6

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…A change of the main database is reflected, forwarded and applied at each of the replicated server which might be in a remote location. …”
    Get full text
    Get full text
    Thesis