Search Results - (( java implementation case algorithm ) OR ( site selection method algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4
  5. 5

    Java based expert system for selection of natural fibre composite materials by Ahmed Ali, Basheer A., Salit, Mohd Sapuan, Zainudin, Edi Syams, Othman, Mohamed

    Published 2013
    “…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
    Review
  8. 8

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Mobile agent routing for query retrieval using genetic algorithm by Selamat, A., Selamat, M. H., Omatu, S.

    Published 2004
    “…Mobile agents often have a task to collect data from several predefined sites.This should be done in an efficient way by minimizing the elapsed time.Usually these agents only know the list of sites but not the distances between them.This paper proposes a method to minimize a network routing time taken by the mobile agents to collect information from different sites using genetic algorithm (GA).The mobile agents repeat travelling over short routes and avoid longer ones.Mobile agents for query retrieval have used the GA to select the best routes that minimize the query retrieval time.The result shows that the proposed method provides good time minimization in retrieving the query results by the mobile agents based on different GA parameters.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Spatial Data Mining Model For Landfill Sites Suitability Mapping Based On Neural Networks And Multivariate Analysis by Abujayyab, Sohaib K. M.

    Published 2017
    “…Hybrid neural network was utilized as an evaluation method to select the optimal selection method and optimal training algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Route selection of mobile agent for query retrieval using GA by Selamat, Ali, Selamat, Md. Hafiz

    Published 2004
    “…Usually these agents only know the list of sites but not the distances between them. This paper proposes a method to minimize a network routing time taken by the mobile agents to collect information from different sites using genetic algorithm (GA). …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan by Muhammad @ Atan, Nurmalessa

    Published 2020
    “…Two additional sites from T&C of the FiT scheme were used for the verification of the new developed FD algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed by Borujeni, Sattar Chavoshi

    Published 2012
    “…In recent years soft computing methods like fuzzy logic and genetic algorithm are being used in modeling complex processes of hydrologic events. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Optimized placement, sizing, and selection of distributed generation using the salp swarm algorithm by Mat Yasin, Zuhaila, Mohammad Noor, Siti Zaliha, Hassan, Elia Erwani, M. Shami, Tareq

    Published 2025
    “…The salp swarm algorithm (SSA) was introduced as a method for efficiently selecting the optimal location, size, and type of distributed generation (DG) in a distribution system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…In this research, first the implementation of Analytical Hierarchy Process (AHP) computational tool was explored for deciding optimum material for automotive components. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A novel framework for identifying twitter spam data using machine learning algorithms by Maziku, Susana Boniphace, Abdul Rahiman, Amir Rizaan, Muhammed, Abdullah, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…By initializing data pre-processing for clean-up, noise removal, and unpredictable unfinished data, reducing the number of features in the tweet dataset using mutual information is the study's methods. The feature selection is introduced to select the most important from the extracted high-dimensional best features and feed the selected features into the minimum Redundancy and Maximal Relevance algorithm and apply random forest for classification. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Visualisation tool to study malaria transmission using network modelling by Wong,, Ji Yeh

    Published 2014
    “…Java was used to implement the visualisation tool. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD