Search Results - (( java implementation among algorithm ) OR ( using text using algorithm ))

Refine Results
  1. 1

    Batch mode heuristic approaches for efficient task scheduling in grid computing system by Maipan-Uku, Jamilu Yahaya

    Published 2016
    “…Many algorithms have been implemented to solve the grid scheduling problem. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
    Review
  6. 6

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Network monopoly / Tan Kean Yeap by Tan , Kean Yeap

    Published 2002
    “…The main aspect of this thesis is to produce a network monopoly system, which process multiple game sessions concurrently, enabling users to play the graphical game with people within the network. The algorithm design and implementation method mustnot only be workable, but also highly efficient in terms of execution speed and respond time. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…To achieve these objectives, the system adopts the Rapid Application Development (RAD) methodology, ensuring iterative design, prototyping, and user feedback integration throughout the process. The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    A new digital watermarking algorithm using combination of Least Significant Bit (LSB) and inverse bit by Bamatraf, Abdullah, Ibrahim, Rosziati, Mohd. Salleh, Mohd. Najib

    Published 2011
    “…We compare our proposed algorithm with the 1-LSB algorithm and Lee’s algorithm using Peak signal-to-noise ratio (PSNR). …”
    Get full text
    Get full text
    Article
  13. 13

    An improved digital watermarking algorithm using combination of least significant bit (LSB) and inverse bit by Abdullah Bamatraf, Abdullah Omar

    Published 2012
    “…We compare our proposed algorithm with the 1-LSB algorithm and Lee’s algorithm and Yang's algorithm using Peak signal�to-noise ratio (PSNR). …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Text searching algorithm using boyer moore horspool (BMH) algorithm by Siti Nurafiqah, Jaafar

    Published 2015
    “…The text searching is one of the famous technique uses to find data or text from the system for faster searching. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15
  16. 16
  17. 17

    An evolutionary harmony search algorithm with dominant point detection for recognition-based segmentation of online Arabic text recognition by Moayad, Yousif Potrus, Ngah, Umi Kalthum, Bestoun S. , Ahmed

    Published 2014
    “…This paper highlights a novel strategy for online Arabic text recognition using a hybrid Genetic Algorithm (GA) and Harmony Search algorithm (HS). …”
    Get full text
    Get full text
    Article
  18. 18

    Secure encryption in network using Data Encryption Standard (DES) for high security transmission by Abdullah, Nur Amila

    Published 2017
    “…Substitution cipher is a technique of encoding where units of plain text are replaced with cipher text and XOR operator is one of the encryption process used to make the cipher text harder to decryption. …”
    Get full text
    Get full text
    Student Project
  19. 19

    Text categorization using naive bayes algorithm by Wan lsmail @ W. Abdullah, Wan Hazimah, Kamaruddin, Siti Sakira, Sainin, Mohd Shamrie

    Published 2006
    “…This algorithm has long been used for text categorization tasks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Data privacy comparison using advanced encryption standard (AES) and data encryption standard (DES) / Hikma Farah Ali by Ali, Hikma Farah

    Published 2019
    “…Our aim is to safely to transfer the file for using the AES algorithm. Proposed algorithm has done by analysing the different time taken for both AES and DES , experiment was done by three different file sizes and also file types, such as text, image and voice to test the encryption and decryption time taken on existing algorithm DES and proposed algorithm, in conclusion, all the results of our propose algorithm shows AES takes lesser time compare to DES. …”
    Get full text
    Get full text
    Thesis