Search Results - (( java implementation case algorithm ) OR ( framework implementation best algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4
  5. 5

    Java based expert system for selection of natural fibre composite materials by Ahmed Ali, Basheer A., Salit, Mohd Sapuan, Zainudin, Edi Syams, Othman, Mohamed

    Published 2013
    “…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
    Review
  8. 8

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Manufacturing process planning optimisation in reconfigurable multiple parts flow lines by Ismail, Napsiah, Musharavati, Farayi, Hamouda, Abdel Magid Salem, Ramli, Abdul Rahman

    Published 2008
    “…Two modified genetic algorithms are devised and employed to provide the best approximate process planning solution. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Comparative Performance Analysis of Bat Algorithm and Bacterial Foraging Optimization Algorithm using Standard Benchmark Functions by Mazlina, Abdul Majid, Alsariera, Yazan A., Alamri, Hammoudeh S., Nasser, Abdullah M., Kamal Z., Zamli

    Published 2014
    “…In order to help engineers make a sound decision on the selection amongst the best meta-heuristic algorithms for the problem at hand, there is a need to assess the performance of each algorithm against common case studies. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Security alert framework using dynamic tweet-based features for phishing detection on twitter by Liew, Seow Wooi

    Published 2019
    “…As a conclusion, this security alert framework has achieved its objective, is the only framework that provides phishing tweet detection security alert to prompt Twitter users to the best of our knowledge.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Estimation-based Metaheuristics: A New Branch of Computational Intelligence by Nor Hidayati, Abd Aziz, Zuwairie, Ibrahim, Saifudin, Razali, Nor Azlina, Ab. Aziz

    Published 2016
    “…Heuristic Kalman Algorithm (HKA) also is inspired by the Kalman Filter framework. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Sentiment analysis on airline reviews using Naive Bayes / Nurul Sarah Aliessa Che Harun by Che Harun, Nurul Sarah Aliessa

    Published 2025
    “…In the design and implementation phases, TF-IDF was considered in cleaning and preparing the reviews for application, while the construction of a sentiment analysis model was implemented through the use of the Multinomial Naive Bayes algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Accelerating DNA sequence alignment based on smith waterman algorithm using recursive variable expansion / Muhamad Faiz Ismail by Ismail, Muhamad Faiz

    Published 2014
    “…Finally, we validate the proposed DP framework using the Smith-Waterman (SW) algorithm, which is a widely used, computation and data intensive application in bioinformatics. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…In this research, first the implementation of Analytical Hierarchy Process (AHP) computational tool was explored for deciding optimum material for automotive components. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Electric vehicle battery state of charge estimation using metaheuristic-optimized CatBoost algorithms by Mohd Herwan, Sulaiman, Zuriani, Mustaffa, Ahmad Salihin, Samsudin, Amir Izzani, Mohamed, Mohd Mawardi, Saari

    Published 2025
    “…Experimental results demonstrate that the BMOCatBoost approach achieved superior performance with best-case metrics of RMSE = 6.1031, MAE = 4.1303, and R² = 0.8211, outperforming both PSOCatBoost, GA-CatBoost, and WOA-CatBoost implementations. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Customised fitness function of evolutionary algorithm for optimization of car park space / Ahmad Syahir Ab. Aziz by Ab. Aziz, Ahmad Syahir

    Published 2017
    “…Genetic algorithm is chosen for the development of the prototype to prove that genetic algorithm is the best technique to implement for optimization. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Visualisation tool to study malaria transmission using network modelling by Wong,, Ji Yeh

    Published 2014
    “…Java was used to implement the visualisation tool. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD