Search Results - (( java implementation among algorithm ) OR ( basic complex machine algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Particle swarm optimization (PSO) for CNC route problem by Nur Azia Azwani, Ismail

    Published 2002
    “…The algorithm used in this project is the Global Best (gbest) algorithm where it is a basic algorithm of Particle Swarm Optimization which applicable the shortest time and path of CNC machine to complete the process of drilling. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
    Review
  6. 6

    IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE by ABDUL RAZAK, NUSRAH

    Published 2017
    “…Selected basic behaviour-based algorithms such as wallfollower, obstacle avoidance, escape route and target detection are to be combined and its efficiency is measured. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Distance measure and its application to decision making, medical diagnosis, and pattern recognition problems under complex picture fuzzy sets by Khan Z., Hussain F., Rahim T., Jan R., Boulaaras S.

    Published 2025
    “…Therefore, in this article, we introduced the notion of complex picture fuzzy sets and investigated their basic properties. …”
    Article
  10. 10

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Cycle time minimization in production line using robust hybrid optimization algorithm by Noorazliza, Sulaiman, Zetty Ain, Kamaruzzaman, Junita, Mohamad Saleh, Ahmad Afif, Ahmarofi

    Published 2021
    “…The results obtained from their research have clearly portrayed the robustness of bio-inspired algorithms to cater complex problems. Assembly line, which is normally the last step of production that involves final assembly of the products. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Shot boundary detection based on orthogonal polynomial by Abdulhussain, Sadiq H., Ramli, Abd Rahman, Mahmmod, Basheera M., Saripan, Mohd Iqbal, Al-Haddad, Syed Abdul Rahman, Jassim, Wissam A.

    Published 2019
    “…The design of SBD algorithms developed from simple feature comparison to rigorous probabilistic and using of complex models. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features by Keshkeh, Kinan, Jantan, Aman, Alieyan, Kamal

    Published 2022
    “…Transport Layer Security (TLS) based malware is one of the most hazardous malware types, as it relies on encryption to conceal connections. Due to the complexity of TLS traffic decryption, several anomaly-based detection studies have been conducted to detect TLS-based malware using different features and machine learning (ML) algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Bottleneck-based heuristic for permutation flowshop scheduling by Isa, Noor Amira

    Published 2017
    “…The previous study found that the scheduling activity become complex when dealing with large number of machine, m > 2, it is NP-hardness. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Recent Advances in Classification of Brain Tumor from MR Images – State of the Art Review from 2017 to 2021 by Ghazanfar, Latif, Faisal Yousif, Al Anezi, Dayang Nurfatimah, Awang Iskandar, Abul, Bashar, Jaafar, Alghazo

    Published 2022
    “…In addition, the review paper will facilitate researchers who are new to machine learning algorithms for brain tumor recognition to understand the basics of the field and pave the way for them to be able to contribute to this vital field of medical research. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Network monopoly / Tan Kean Yeap by Tan , Kean Yeap

    Published 2002
    “…The main aspect of this thesis is to produce a network monopoly system, which process multiple game sessions concurrently, enabling users to play the graphical game with people within the network. The algorithm design and implementation method mustnot only be workable, but also highly efficient in terms of execution speed and respond time. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Batch mode heuristic approaches for efficient task scheduling in grid computing system by Maipan-Uku, Jamilu Yahaya

    Published 2016
    “…Many algorithms have been implemented to solve the grid scheduling problem. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Review of deep convolution neural network in image classification by Al-Saffar, Ahmed Ali Mohammed, Tao, Hai, Mohammed, Ahmed Talab

    Published 2017
    “…With the development of large data age, Convolutional neural networks (CNNs) with more hidden layers have more complex network structure and more powerful feature learning and feature expression abilities than traditional machine learning methods. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Automatic generic process migration system in linux by Zarrabi, Amirreza

    Published 2012
    “…A fexible interface to the underlying checkpoint/ restart subsystem is designed which permits users to specify the migration mechanism according to process constraints. A migration algorithm is designed which attempts to exploit the unique features of the basic migration algorithms to form a generic algorithm. …”
    Get full text
    Get full text
    Thesis