Search Results - (( java implementation among algorithm ) OR ( using combination using algorithm ))

Refine Results
  1. 1

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  4. 4

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
    Review
  5. 5

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms by Teoh, Chin Chuang

    Published 2005
    “…In cluster generating process, the developed BBSI algorithm was used to select the best band combination for generating cluster by using Iterative self- Organizing Data Analysis (ISODATA) technique. …”
    Get full text
    Get full text
    Thesis
  9. 9

    To study the performance of stemming algorithm on Malay words beginning with the letter "S" / Rohana Jantan by Jantan, Rohana

    Published 2000
    “…This algorithm is used in the Malay language document that is used is the Quran translated document. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An Experimental Study Of Combinational Logic Circuit Minimization Using Firefly Algorithm by Aznilnda, Zainodin, Aida Khairunisa, Ab. Kadir, M. Nasir, Ayob, Ahmad Fariz, Hasan, Amar Faiz, Zainal Abidin, Fazlinashatul Suhaidah, Zahid, Hazriq Izuan, Jafar, Ismail, Mohd Khairuddin

    Published 2014
    “…Combinatorial logic circuit minimization is usualy done using Karnaugh’s Map or Bolean equation. This paper presents an aplication of Firefly Algorithm to design combinational logic circuit in which the objective function is to minimize the total number of gates used. …”
    Get full text
    Get full text
    Article
  11. 11

    Study of stemming algorithm for Malay words which begin with alphabets 'M' / Mohd Zawawi Mohd Yunus by Mohd Yunus, Mohd Zawawi

    Published 2000
    “…These stemming algorithm problems will be solved by doing five experiments such as analysis the existing algorithm, do correction in the file, adding rules, correct the stemming algorithm and use two combination rules. …”
    Get full text
    Get full text
    Thesis
  12. 12

    JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation by Abu, Ahmad Zaidee

    Published 2008
    “…The proposed approach uses a frequency domain combinational framework of coefficients scrambling with Key Scheduling Algorithm based (KSA-based) permutation. …”
    Get full text
    Get full text
    Thesis
  13. 13

    To improve stemming algorithm on Malay words begin with alphabet B / Norasiah Ismail by Ismail, Norasiah

    Published 2001
    “…This involves the use of two combinations simultaneously such as the pair combination of prefix-suffix-prefix suffix-infix as primary combinations and prefix suffix-suffix-prefix-infix as the secondary. …”
    Get full text
    Get full text
    Thesis
  14. 14

    The study of stemming algorithm for Malay words that start with the letter 'B' from translated Quran documents / Azriana Ahmad by Ahmad, Azriana

    Published 1999
    “…The performance of this Malay stemming algorithm is tested using translated Quran documents and Malay dictionary. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Network monopoly / Tan Kean Yeap by Tan , Kean Yeap

    Published 2002
    “…The main aspect of this thesis is to produce a network monopoly system, which process multiple game sessions concurrently, enabling users to play the graphical game with people within the network. The algorithm design and implementation method mustnot only be workable, but also highly efficient in terms of execution speed and respond time. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Ensemble Dual Recursive Learning Algorithms for Identifying Custom Tanks Flow with Leakage by Akib, Afifi, Saad , Nordin, Asirvadam , Vijanth Sagayan

    Published 2010
    “…For this purpose, three models is developed, first using recursive least square algorithm (RLS), second using recursive instrument variable (RIV) algorithm and lastly using combination of this two algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Ensemble dual recursive learning algorithms for identifying flow with leakage by Akib, Afifi, Saad , Nordin, Asirvadam , Vijanth Sagayan

    Published 2010
    “…For this purpose, three models is developed, first using recursive least square algorithm (RLS), second using recursive instrument variable (RIV) algorithm and lastly using combination of this two algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Shape-based recognition using combined Jaccard and Mahalanobis measurement / Noor Aznimah Abdul Aziz by Abdul Aziz, Noor Aznimah

    Published 2013
    “…Therefore, we proposed a shape recognition algorithm using similarity measurement combining Jaccard and Mahalanobis distance is used to measure the similarity between geometry shape sketches. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Committee neural networks with fuzzy genetic algorithm. by Jafari , S.A., Mashohor , Syamsiah, Varnamkhasti, M. Jalali

    Published 2011
    “…There are different ways of combining the intelligent systems' outputs in the combiner in the committee neural network, such as simple averaging, gating network, stacking, support vector machine, and genetic algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Batch mode heuristic approaches for efficient task scheduling in grid computing system by Maipan-Uku, Jamilu Yahaya

    Published 2016
    “…Many algorithms have been implemented to solve the grid scheduling problem. …”
    Get full text
    Get full text
    Get full text
    Thesis