Search Results - (( java implementation learning algorithm ) OR ( program case sizing algorithm ))
Search alternatives:
- implementation learning »
- java implementation »
- learning algorithm »
- sizing algorithm »
- program case »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Firefly algorithm for optimal sizing of Standalone Photovoltaic System / Nurizzati Abdul Aziz
Published 2016“…Therefore, optimization methods are often used in the sizing algorithms for such systems. This study presents the development of Firefly Algorithm-based Sizing Algorithm, known as FASA for sizing optimization of SAPV systems. …”
Get full text
Get full text
Thesis -
3
Firefly algorithm for optimal sizing of stand-alone photovoltaic system / Nur Izzati Abdul Aziz
Published 2016“…Therefore, optimization methods are often used in the sizing algorithms for such systems. This study presents the development of firefly algorithm-based sizing algorithm, known as FASA for sizing optimization of SAPV systems. …”
Get full text
Get full text
Thesis -
4
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
6
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
7
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
8
A study on the VLSI partitions: the implementation of Fiduccia-Mattheyses algorithm / Burhanuddin Omar
Published 1997“…An iterative mincut heunstic for partitioning networks is presented whose worst case computation time, per pass, grows linearly with the size of the network. …”
Get full text
Get full text
Thesis -
9
-
10
Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance
Published 2021“…With problem size of m = 5, n = 5, and 20% of nonzeroes in constraints matrix, the result of the iteration number was as follows: new augmentation algorithm = 1, QSM = 2, BLSA = 3, and Simplex = 6, and with problem size of m = 100, n = 100, and 80% of nonzeroes in constraints matrix, the result of the iteration number was as follows: new augmentation algorithm = 78, QSM = 84, BLSA = 87, and Simplex = 99. …”
Get full text
Get full text
Get full text
Thesis -
11
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
12
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
13
Long-term optimal planning of distributed generations and battery energy storage systems towards high integration of green energy considering uncertainty and demand response progra...
Published 2025“…It simultaneously minimizes three long-term objectives: total cost, power loss, and voltage deviation by determining the optimal locations and sizes for wind-DGs, PV-DGs, and BESSs. Additionally, the model incorporates a demand response program (DRP) to enhance green energy integration further. …”
Article -
14
Adaptive Embedded Clonal Evolutionary Programming (AECEP) for optimal Distributed Generation (DG) location and sizing in a distribution system
Published 2013“…AI methods mainly include Artificial Neural Network (ANN), Expert System (ES), Genetic Algorithm (GA), Evolutionary Programming (EP), Ant Colony Optimization (ACO) and Particle Swarm Optimization (PSO). …”
Get full text
Get full text
Thesis -
15
Battery energy storage system sizing using PSO algorithm in DIgSILENT powerfactory
Published 2022“…The IEEE 9-bus system is the test case used to demonstrate and discuss the application of algorithms in DPL script. …”
Get full text
Get full text
Get full text
Article -
16
A Community-Based Fault Isolation Approach for Effective Simultaneous Localization of Faults
Published 2019“…The approach is evaluated on eight subject programs ranging from medium-sized to large-sized programs (tcas, replace, gzip, sed, flex, grep, make, and ant). …”
Get full text
Get full text
Article -
17
Chaotic mutation immune evolutionary programming for voltage security with the presence of DGPV
Published 2023“…The simulation results are also compared with Evolutionary Programming (EP) and Chaotic Evolutionary Programming (CEP) and it is found that CMIEP performed better in most of the cases. � 2017 Institute of Advanced Engineering and Science. …”
Article -
18
-
19
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
20
Effect of multi-unit and multi-type DG installation using integrated optimization technique in distribution power system planning
Published 2025“…Two cases were considered in this study termed Case 1 and Case 2. …”
Article
