Search Results - (( java implementation among algorithm ) OR ( using interactive efficient algorithm ))
Search alternatives:
- interactive efficient »
- implementation among »
- java implementation »
- among algorithm »
-
1
Network game (Literati) / Chung Mei Kuen
Published 2003“…It should be an interesting, time and value worth topic to research on. By using Java applet, it will give a good interactive response since it does not suffer from the delays or variability of bandwidth associated with network connection. …”
Get full text
Get full text
Thesis -
2
Network monopoly / Tan Kean Yeap
Published 2002“…The main aspect of this thesis is to produce a network monopoly system, which process multiple game sessions concurrently, enabling users to play the graphical game with people within the network. The algorithm design and implementation method mustnot only be workable, but also highly efficient in terms of execution speed and respond time. …”
Get full text
Get full text
Thesis -
3
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
4
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
5
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
6
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
7
Efficient prime-based method for interactive mining of frequent patterns.
Published 2011“…Recently, a few efficient interactive mining algorithms have been proposed, which are able to capture the content of transaction database to eliminate possibility of the database rescanning. …”
Get full text
Get full text
Article -
8
Enhancing Harmony Search Metaheuristic Algorithm for Coverage Efficiency, Test Suite Reduction, and Running Time in Combinatorial Interaction Testing
Published 2025“…Optimization has developed powerful algorithms for solving complex problems efficiently. …”
Get full text
Get full text
Article -
9
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. …”
Get full text
Get full text
Article -
10
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Fast and efficient sequential learning algorithms using direct-link RBF networks
Published 2003“…The dynamic DRBF network is trained using the recently proposed decomposed/parallel recursive Levenberg Marquardt (PRLM) algorithm by neglecting the interneuron weight interactions. …”
Get full text
Get full text
Book Section -
12
Adapting the Elitism on the Greedy Algorithm for Variable Strength Combinatorial Test Cases Generation
Published 2018“…This study presented the most recent variable interaction strength (VS) CT strategy using an enhanced variant in the greedy algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Simultaneous Adaptation Of Multiple Genetic Algorithm Parameters Using Fuzzy Logic Controllers
Published 2010“…Fuzzy Adaptive Genetic Algorithm techniques have been used recently for parameter control,…”
Get full text
Get full text
Thesis -
14
Prime-based method for interactive mining of frequent patterns
Published 2010“…Thus far, a few efficient interactive mining algorithms have been proposed. …”
Get full text
Get full text
Thesis -
15
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…A tool termed as VIGA-20 (Visualization of Genetic Algorithm using 2-0 Graph) is implemented to accomplish this goal. …”
Get full text
Get full text
Thesis -
16
Stagnation control using interacted multiple ant colonies
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
18
A real-time vision-based touchless interaction of virtual heart using integration of motion gesture interaction methods
Published 2014“…In this study, a prototype of Augmented Reality system that implements gesture motion is developed. The use of the gesture motion algorithm enables an interactive environment in medical imaging.…”
Get full text
Get full text
Academic Exercise -
19
Input-output based relation combinatorial testing using whale optimization algorithm for generating near optimum number of test suite
Published 2025“…Given the impracticality of testing every possible interaction due to time, budget, and resource constraints, combinatorial testing, which is t-way testing, is adopted to cover parameter interactions efficiently. …”
Get full text
Get full text
Get full text
Article -
20
African buffalo optimization algorithm based t-way test suite generation strategy for electronic-payment transactions
Published 2022“…The use of meta-heuristics in Combinatorial Interaction Testing (CIT) is becoming more and more popular due to their effectiveness and efficiency over the traditional methods especially in authenticating electronic payment (e�payment) transactions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
