Search Results - (( java application search algorithm ) OR ( parameter implementation level algorithm ))
Search alternatives:
- parameter implementation »
- implementation level »
- application search »
- java application »
- level algorithm »
-
1
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
Get full text
Get full text
Journal -
2
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016“…The search algorithm is a crucial part in any internet applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
4
Songs Search Using Human Humming Voice
Published 2007Get full text
Get full text
Final Year Project -
5
Dynamic traffic scheduling and resource reservation algorithms for output-buffered switches
Published 2002“…Previously, this algorithm has been analysed for a unified resource reservation and scheduling algorithm while implementing a tail discarding strategy. …”
Get full text
Get full text
Thesis -
6
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
7
ANALYSIS AND INTERPRETATION OF PRESSURE TRANSIENT TEST DATA BY RECENT ROBUST DECONVOLUTION METHODS
Published 2013“…In this work, by using the recent robust deconvolution algorithm of Pimonov et al. and/or the ones implemented in Weatherford PanSystem Well Test Software, the effects of the algorithmic parameters (including error levels in pressure and rate data, and the curvature constraint value) as well as the initial pressure on the deconvolved responses are investigated. …”
Get full text
Get full text
Final Year Project -
8
Implementation of High Speed Large Integer Multiplication Algorithm on Contemporary Architecture
Published 2018“…We are able to eliminate the bottleneck, the CRT algorithm from our previous implementation by replacing it with another level of CTFNT and hence increased the multiplication operand size to 4096, 192K, 384K and 768K-bit.In our FPGA implementation, we focused on designing the processing unit ourselves that is capable of computing 3072-bit multiplication. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Agents for Fuzzy Indices of Reliability Power System with Uncertainty Using Monte Carlo Algorithm
Published 2014“…The standard deviation of load level uncertainty in power system reliability assessment has a different value for each load level leading to complexity iterations required in the convergence of Monte Carlo algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Initially, this tool adopts only Crow Search, Jaya, and Sine Cosine algorithms. But more metaheuristics will be included in future research. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Evolutionary Music; Composing Beats and Chords Progression
Published 2020“…Evoluthm utilizes Harmony Search Algorithm and JFUGUE techniques in compliances with artificial intelligence (AI). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. …”
Get full text
Get full text
Thesis -
13
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
14
Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong
Published 2018“…The computational results show that the algorithms which implement this new formulation are able to produce better solutions. …”
Get full text
Get full text
Get full text
Thesis -
15
Implementation of generalized predictive control (GPC) for a real-time process control using labview
Published 2006“…In this research, a predictive algorithm namely Generalized Predictive Control will be evaluated in real-time by applying LabVIEW software as tools for algorithm implementation. …”
Get full text
Get full text
Thesis -
16
Hybrid genetic algorithm for improving fault localization
Published 2018“…Therefore, there is a need for a technique which able to localize a fault effectively with less number of mutants generated. Genetic algorithm (GA) is well known in finding an optimal solution to a problem while local search is capable of removing duplication. …”
Get full text
Get full text
Get full text
Article -
17
Identification of continuous-time model of hammerstein system using modified multi-verse optimizer
Published 2021“…For the numerical identifications, three different levels of white noise variances were taken. The statistical analysis value (mean) was taken from the parameter deviation index to see how much our proposed algorithm has improved. …”
Get full text
Get full text
Thesis -
18
Non-invasive gliomas grading using swarm intelligence algorithm / Muhammad Harith Ramli
Published 2017“…The basic feature extraction of minimum, maximum and mean of gray level values are used as the parameter to develop the prototype. …”
Get full text
Get full text
Thesis -
19
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Secondly, an expert system using Java programming technology with two tiers of search engine was developed to perform a fast selection of candidate materials in huge volume. …”
Get full text
Get full text
Thesis -
20
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis
