Search Results - (( java implementation case algorithm ) OR ( parameter implementation graph algorithm ))
Search alternatives:
- parameter implementation »
- implementation graph »
- java implementation »
- implementation case »
- graph algorithm »
- case algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Static and dynamic graphs modeling of a boiler system / Noor Ainy Harish
Published 2015“…The dynamic graphs found from the implementation of DAGA to the boiler system are then further investigated where connection of the graphs to fuzzy graph of type-1 are established. …”
Get full text
Get full text
Thesis -
3
Parameter estimation of multivariable system using Fuzzy State Space Algorithm / Razidah Ismail … [et al.]
Published 2011“…In order to enhance the implementation of the algorithm, it is necesssary to develop an efficient computation program together with the user's interface. …”
Get full text
Get full text
Research Reports -
4
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…A tool termed as VIGA-20 (Visualization of Genetic Algorithm using 2-0 Graph) is implemented to accomplish this goal. …”
Get full text
Get full text
Thesis -
5
-
6
The development of parameter estimation method for Chinese hamster ovary model using black widow optimization algorithm
Published 2020“…Metaheuristic parameter estimation is an algorithm framework that is processed using some technique to generate a pattern or graph. …”
Get full text
Get full text
Get full text
Article -
7
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
9
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article -
10
-
11
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
12
Power system network splitting and load frequency control optimization using ABC based algorithms / Kanendra Naidu a/l Vijyakumar
Published 2015“…This research presents a modified optimization program for the system splitting problem in large scale power system based on Artificial Bee Colony algorithm and graph theory. The post-islanding frequency stability is maintained by optimizing the Load Frequency Control‘s parameters. …”
Get full text
Get full text
Thesis -
13
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…We describe our approach for implementing an optimized security assessment using Genetic Algorithm (GA). …”
Get full text
Get full text
Article -
14
Attack path selection optimization with adaptive genetic algorithms
Published 2016“…We describe our approach for implementing an optimized security assessment using Genetic Algorithm (GA). …”
Get full text
Get full text
Article -
15
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
17
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
18
Comparison performances between MABSA-PI controller and MABSA-PD controller for DC motor position system
Published 2023“…Modified adaptive bats sonar algorithm (MABSA) will be implemented in the PI controller and PD controller as the main algorithm. …”
Get full text
Get full text
Get full text
Article -
19
The existence of inflection points for generalized log-aesthetic curves satisfying G1 data
Published 2015“…Log-Aesthetic (LA) curves have been implemented in a CAD/CAM system for various design feats.LA curves possess linear Logarithmic Curvature Graph (LCG) with gradient (shape parameter) denoted as α.In 2009, a generalized form of LA curves called Generalized Log-Aesthetic Curves (GLAC) has been proposed which has an extra shape parameter as ν compared to LA curves.Recently, G1 continuous GLAC algorithm has been proposed which utilizes the extra shape parameter using four control points.This paper discusses on the existence of inflection points in a GLAC segment satisfying G1 Hermite data and the effect of inflection point on convex hull property.It is found that the existence of inflection point can be avoided by manipulating the value of α.Numerical experiments show that the increase of α may remove the inflection point (if any) in a GLAC segment.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
A direct proof of improved biased random walk with gastric cancer dataset
Published 2018“…An equation of biased random walk which named as significant directed random walk is formed to enhance the connectivity of nodes in directed graph via weigh. To be completely biased to the random walk, references data is implement as directed graph. …”
Get full text
Get full text
Conference or Workshop Item
