Search Results - (( java evaluation between algorithm ) OR ( program visualisation based algorithm ))
Search alternatives:
- program visualisation »
- visualisation based »
- evaluation between »
- between algorithm »
- java evaluation »
-
1
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
Get full text
Get full text
Thesis -
2
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
3
Correlation analysis and predictive performance based on KNN and decision tree with augmented reality for nuclear primary cooling process / Ahmad Azhari Mohamad Nor
Published 2024“…Subsequently, predictive models employing k-nearest neighbour and decision tree algorithms are constructed and evaluated based on accuracy, precision, and recall metrics. …”
Get full text
Get full text
Thesis -
4
-
5
FBGA-based implementation of electronic abacus using altera DE2 board
Published 2017“…The electronic abacus is developed by integrating an abacus, abacus decoder module and FPGA-based processor. DE2 115 is chosen as the development module and VHDL as main programming language. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Reconstruction algorithm of calibration map for RPT technique in quadrilateral bubble column reactor using MCNPX code
Published 2018“…In this study, Monte Carlo approach was programmed to reconstruct the particle tracer position so-called calibration map. …”
Get full text
Get full text
Get full text
Article -
7
Extracting Object Oriented Software Architecture from C++ Source Code
Published 2000Get full text
Get full text
Thesis -
8
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Subsequently, an experimental evaluation of the proposed Multi-Filter Feature Selection (M2FS) method is performed by using the benchmark dataset, NSL-KDD and employed the J48 classification algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Batch mode heuristic approaches for efficient task scheduling in grid computing system
Published 2016“…We simulate our proposed algorithms using a Java based simulator that is purposedly built for Grid computing simulations. …”
Get full text
Get full text
Get full text
Thesis -
10
An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance
Published 2025“…The research experiment has shown the process of calculating the Distance matrix for the sample Java Programs and subsequent evaluation using the mutation testing approach and APFD calculation. …”
Get full text
Get full text
Get full text
Article -
11
Landslide Susceptibility Mapping with Stacking Ensemble Machine Learning
Published 2024“…As the data are extremely imbalanced, Adaptive Synthetic (ADASYN) resampling technique was picked to balance the data between two classes, i.e., landslide and non-landslide. …”
Conference Paper -
12
Development of seven segment display recognition using TensorFlow on Raspberry Pi
Published 2022Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
Published 2019“…To achieve energy efficiency, it compresses the packet information by using GZIP tools in JAVA. SecPath is evaluated with several variations using 400 nodes in WSN deployments as well as large-scale simulations. …”
Get full text
Get full text
Thesis -
14
Energy efficient path reconstruction in wireless sensor network using iPath
Published 2019“…To achieve energy efficiency, it compresses the packet information by using GZIP tools in JAVA. Energy efficient iPath (E-iPath) is evaluated with several variations of nodes in WSN deployments as well as large-scale simulations. …”
Get full text
Get full text
Get full text
Article -
15
Modified dynamic programming model with limited order picking capacity / Noraimi Azlin Mohd Nordin
Published 2021“…Next, to determine either Dijsktra’s algorithm or Dynamic Programming Method will give the most accurate shortest path and minimum travel time for order pickers. …”
Get full text
Get full text
Get full text
Thesis -
16
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis -
17
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The second agent is a reliability evaluation agent that uses a recursive algorithm to predict the suitability generator based on the frequency and duration reliability indices in each state while the third agent is the storage and transfer of data between the other two agents. …”
Get full text
Get full text
Thesis
