Search Results - (( java implementation case algorithm ) OR ( knowledge preservation using algorithm ))
Search alternatives:
- knowledge preservation »
- java implementation »
- implementation case »
- preservation using »
- using algorithm »
- case algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
5
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article -
6
-
7
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
8
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
10
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
11
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…In doing so, the old knowledge can be preserved dynamically to overcome the concept drift. …”
Get full text
Get full text
Thesis -
12
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…In this research, first the implementation of Analytical Hierarchy Process (AHP) computational tool was explored for deciding optimum material for automotive components. …”
Get full text
Get full text
Thesis -
13
Gajah Olen : Preserving a Malay Wedding Traditional through Crowdsourcing Approach
Published 2020“…There are three main objectives of this project; to design and develop a platform to preserve Malay wedding tradition which is Gajah Olen, to create implicit knowledge of Malay Sarawak wedding tradition by using a crowdsourcing approach and to apply the recommendation system by using collaborative filtering algorithm into a platform for Malay wedding tradition in order to verify the content before publishing it to the public. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
14
Visualisation tool to study malaria transmission using network modelling
Published 2014“…Java was used to implement the visualisation tool. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
15
Blind motion image deblurring using canny edge detector with generative adversarial networks / Idriss Moussa Idriss
Published 2021“…Experiment s are conducted using the GoPro dataset. The proposed combined method has achieved good deblurring with edge-preserving results based on the evaluation metrics used. …”
Get full text
Get full text
Get full text
Thesis -
16
Out-of-core simplification with appearance preservation for computer game applications
Published 2006“…Subsequently, submeshes are simplified using a new variation of vertex clustering technique. …”
Get full text
Get full text
Thesis -
17
MFA-OSELM Algorithm For Wifi-Based Indoor Positioning System
Published 2019“…WiFi has exhibited a tremendous capability for internal localization since it is extensively used and easily accessible. Facilitating the use of WiFi for this purpose requires fingerprint formation and the implementation of a learning algorithm with the aim of using the fingerprint to determine locations. …”
Get full text
Get full text
Get full text
Article -
18
Ball surface representations using partial differential equations
Published 2015“…This algorithm is then tested in positivity preserving of surface and image enlargement problems. …”
Get full text
Get full text
Get full text
Thesis -
19
Out-of-core simplification with appearance preservation for computer game applications
Published 2006“…Subsequently, submeshes are simplified using a new variation of vertex clustering technique. …”
Get full text
Get full text
Monograph -
20
Managing Fragmented Database Using BVAGQ-AR Replication Model
Published 2017“…The result shows that managing fragmented database replication through proposed BVAGQ-AR algorithm able to preserve data consistency. …”
Get full text
Get full text
Get full text
Article
