Search Results - (( java implementation case algorithm ) OR ( using simulation model algorithm ))
Search alternatives:
- java implementation »
- implementation case »
- model algorithm »
- case algorithm »
-
1
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
5
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
6
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article -
7
-
8
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
9
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
11
Assessing the simulation performances of multiple model selection algorithm
Published 2015“…The Autometrics is an algorithm for single equation model selection.It is a hybrid method which combines expanding and contracting search techniques.In this study, the algorithm is extended for multiple equations modelling known as SURE-Autometrics.The aim of this paper is to assess the performance of the extended algorithm using various simulation experiment conditions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
13
Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation
Published 2015“…The main objective of this research is to validate the NIRR algorithm by developing a comprehensive simulation model using Discrete Event Simulation (DES). …”
Get full text
Get full text
Thesis -
14
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…This demonstrates the feasibility of using the FDM and parallel computing to reduce the computational time in the EHD model enabling to simulate the micropumps with very small dimensions of electrodes. …”
Get full text
Get full text
Thesis -
15
Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation
Published 2016“…The main objective of this research is to validate the NIRR algorithm by developing a comprehensive simulation model using Discrete Event Simulation (DES). …”
Get full text
Get full text
Get full text
Article -
16
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
17
Ensemble Dual Recursive Learning Algorithms for Identifying Custom Tanks Flow with Leakage
Published 2010“…Relative mass release of the leakage is introduced as the input for the simulation model and the data from the simulation model is taken at real time (on-line) to feed into the recursive algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
18
Modelling and simulation of hysteresis control algorithm for use in single phase ac-to-ac matrix converter / Seri Iryani Mohd Noor
Published 2003“…This thesis is illustrated by developing computer simulation models of ac-to-ac single phase matrix converter (SPMC) using sinusoidal pulse width modulation (SPWM) technique and another algorithm i.e hysteresis control technique. …”
Get full text
Get full text
Thesis -
19
Incorporating the range-based method into GridSim for modeling task and resource heterogeneity
Published 2017“…In this paper, we propose a new simulation model that incorporates the range-based method into GridSim for modeling and simulating heterogeneous tasks and resources in order to capture the inherent heterogeneity of Grid environments that later can be used by other researchers to test their algorithms.…”
Get full text
Get full text
Get full text
Article -
20
Power Delivery Network Modeling And Simulation By Using Delaunay-Voronoi Triangulation And The Latency Insertion Method
Published 2018“…The research is focused into the analysis of PDN by modeling and simulation of the power plane. In the project, power plane is modeled using Delaunay-Voronoi algorithm and for simulation, a fast transient simulation algorithm which is latency insertion method (LIM) is applied. …”
Get full text
Get full text
Monograph
