Search Results - (( java implementation case algorithm ) OR ( program network model algorithm ))
Search alternatives:
- java implementation »
- implementation case »
- model algorithm »
- case algorithm »
-
1
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
2
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
Quality of service in mobile IP networks with parametric multi-channel routing algorithms based on linear programming approach
Published 2018“…This approach tunes the parameters of the linear programming models that are used in the other algorithms by using a dynamic element. …”
Get full text
Get full text
Thesis -
5
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
6
A hybrid intelligent algorithm for solving the bilevel programming models
Published 2011Get full text
Working Paper -
7
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
8
Logic Programming In Radial Basis Function Neural Networks
Published 2013“…The first technique is to encode the logic programming in radial basis function neural networks. …”
Get full text
Get full text
Thesis -
9
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article -
10
-
11
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
12
Study Of Modified Training Algorithm For Optimized Convergence Speed Of Neural Network
Published 2016“…In this research, a hand-written character recognition model are implemented in C++ programming with ability to classify digits 0, 1, 2, and 3. …”
Get full text
Get full text
Thesis -
13
Self-similar network traffic using Random Midpoint Displacement (RMD) algorithm / Jumaliah Saarini
Published 2006“…This project is to generate the self-similar network traffic. It is generally accepted that self-similar or fractal process may provide better models for in modern network traffic than Poisson process. …”
Get full text
Get full text
Student Project -
14
Neural network based model predictive control for a steel pickling process
Published 2009“…The Levenberg-Marquardt algorithm is used to train the process models. In the control (MPC) algorithm, the feedforward neural network models are used to predict the state variables over a prediction horizon within the model predictive control algorithm for searching the optimal control actions via sequential quadratic programming. …”
Get full text
Get full text
Article -
15
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Data mining in network traffic using fuzzy clustering
Published 2003“…These various application make it difficult for the network administrator to model certain network traffic. …”
Get full text
Get full text
Thesis -
17
Data mining in network traffic using fuzzy clustering
Published 2003“…These various application make it difficult for the network administrator to model certain network traffic. …”
Get full text
Get full text
Thesis -
18
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
19
Neural network modeling and optimization for spray-drying coconut milk using genetic algorithm and particle swarm optimization
Published 2022“…Integration of global search algorithm into ANN model further improved the model performance. …”
Get full text
Get full text
Thesis -
20
Determining Suitable Program For SPM Holder Using Neural Network Approach
Published 2002“…This study involves the development of a neural network (NN) prediction model proposed for the educational spanding spesifically in determining suitable program for SPM Holder . …”
Get full text
Get full text
Get full text
Thesis
