Search Results - (( java data normalization algorithm ) OR ( program evaluation practices algorithm ))
Search alternatives:
- normalization algorithm »
- evaluation practices »
- data normalization »
- java »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
3
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…Overall, the VR products developed have proven to be practical and effective in learning programming algorithms. …”
Get full text
Get full text
Get full text
Article -
4
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
5
Online Programming Judge System (UOJ)
Published 2013“…The system has the function to judge programming code by evaluating the output that the program produced. …”
Get full text
Get full text
Final Year Project -
6
Swarm inspired test case generation for online C++ programming assessment
Published 2014“…It also helps students to practice and enhance their programming skills. In this study, the mechanism of automatic test case generation was explored using Particle Swarm Optimization (PSO) algorithm and new fitness function is proposed to determine the optimal solution for each problem. …”
Get full text
Get full text
Conference or Workshop Item -
7
Metaheuristic Algorithms Based on Compromise Programming for the Multi-Objective Urban Shipment Problem
Published 2022“…We evaluated the effectiveness of the proposed algorithm with the Tabu Search algorithm and the original genetic algorithm on the tested dataset. …”
Get full text
Get full text
Article -
8
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
Published 2019“…In point of fact, it is significant to produce a security evaluation of block cipher algorithms to determine a statistical non-random behavior of attacks. …”
Get full text
Get full text
Get full text
Article -
9
-
10
A study on the VLSI partitions: the implementation of Fiduccia-Mattheyses algorithm / Burhanuddin Omar
Published 1997“…The program is being develop using this algorithm. The evaluation and comparison also been carried out between this method and Kernighan-Lin method.…”
Get full text
Get full text
Thesis -
11
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…It has been applied in many practical applications. For most of the cases of the shortest route finding, the Dijkstra's algorithm is known to be an optimal search algorithm. …”
Get full text
Get full text
Thesis -
12
Optimizing tree planting areas through integer programming and improved genetic algorithm
Published 2012“…Therefore, a hybrid algorithm through an incorporation of Integer Programming and Improved Genetic Algorithm was proposed for planting lining design. …”
Get full text
Get full text
Thesis -
13
Low-level hybridization scripting language with dynamic parameterization in PSO-GA / Suraya Masrom
Published 2015“…In the scripting language evaluation, nine LLHs and three single PSO algorithms have been successfully created using the scripting languages. …”
Get full text
Get full text
Thesis -
14
An integrated reservoir modelling and evolutionary algorithm for optimizing field development in a mature fractured reservoir
Published 2016“…The second method is automatic optimization using Genetic Algorithm. That depends on the principle of natural selection as proposed by Darwin The genetic program was coupled with the reservoir flow model to re-evaluate the chosen wells at each iteration until obtaining the optimal choice. …”
Get full text
Get full text
Conference or Workshop Item -
15
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
16
PID TUNING OF DC MOTOR USING SWARM ITELLIGENCE ALGORITHM
Published 2012“…PSO-PID Controller Graphical User Interface (GUI) has developed that integrates both C++ and MATLAB program for more practical use.…”
Get full text
Get full text
Final Year Project -
17
A review of slicing techniques in software engineering
Published 2015“…Quite a large numbers of variants for the program slicing have been analyzed along with the algorithms to compute the slice. …”
Get full text
Get full text
Get full text
Proceeding Paper -
18
-
19
Back propagation neural network approach for churn prediction: a case study in Celcom (M) Berhad / Hapida Husin
Published 2008“…The data has been chunk into a few series to determine the significant variables for predicting churn. Computer program were written in Matlab to implement the training and testing programs for the ANN algorithms. …”
Get full text
Get full text
Thesis -
20
Analysis the components of SNOW 3G and ZUC ciphers in mobile systems
Published 2018“…The SNOW 3G and ZUC ciphers algorithms are classified as stream ciphers, used as confidentiality algorithms in third and fourth generations of Mobile Technologies (3G-UMTS and 4G- LTE). …”
Get full text
Get full text
Get full text
Article
