Search Results - (( java implementation learning algorithm ) OR ( using execution modified algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    A Modified LRE-TL Real-Time Multiprocessor Scheduling Algorithm by Alhussian, Hitham, Zakaria, Mohd Nordin, Hussin, Fawnizu Azmadi, Bahbouh, Hussein T

    Published 2013
    “…We have conducted an independent-samples t test to compare tasks migration using the original LRE-TL algorithm and the modified algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    A modified LRE-TL real-time multiprocessor scheduling algorithm by Alhussian, H., Zakaria, N., Hussin, F.A., Bahbouh, H.T.

    Published 2014
    “…We have conducted an independent-samples t-test to compare tasks migration using the original LRE-TL algorithm and the modified algorithm. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment by Nurul Atikah Janis

    Published 2018
    “…The second approach is the modification of heuristic computation using original A* and modified Bresenham. Bresenham Line Algorithm is a line generation algorithm using integer arithmetic where the points (x1, y1) and (x2, y2) are assumed not equal and integer valued. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Reducing Tasks Migration in LRE-TL Real-time Multiprocessor Scheduling Algorithm by Alhussian, Hitham, Nordin, Zakaria M, Hussin, Fawnizu Azmadi, Bahbouh, Hussein T.

    Published 2013
    “…To verify our work, an independent-samples t-test is used to compare tasks migration using the original LRE-TL algorithm and the modified one. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing by Rahman, Gohar

    Published 2023
    “…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Octopus++: an enhanced mutual authentication protocol with lightweight encryption and decryption algorithm based on dna in fog computing by Rahman, Gohar

    Published 2023
    “…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    New algorithm for autonomous dynamic path planning in real-time intelligent robot car by Mohammed, Akeel Ahmed, Hassan, Mohd Khair, Aris, Ishak, Kamsani, Noor Ain

    Published 2017
    “…Different algorithms have been used to address this problem by considering the optimal path with minimum cost; however, these algorithms did not consider the execution time to find such path. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Dynamic obstacle handling in multi-robot coverage by Tay, Wing Le

    Published 2024
    “…The simulations were conducted by using MATLAB to demonstrate the superiority of Modified Lloyd’s algorithm with VO over existing Lloyd’s algorithm in terms of average of total number of collisions between robots and dynamic obstacle during coverage task. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17
  18. 18
  19. 19

    Minimizing Scheduling Overhead In LRE-TL Real-Time Multiprocessor Scheduling Algorithm by Alhussian, Hitham, Zakaria, Nordin, Hussin, Fawnizu Azmadi

    Published 2015
    “…In this paper, we present a modification of Local Remaining Execution-Time and Local time domain (LRE-TL) real-time multiprocessor scheduling algorithm, aimed at reducing the scheduling overhead in terms of task migrations. …”
    Get full text
    Get full text
    Article
  20. 20

    Soap performance enhancement for high volume messaging / Ali Baba Dauda by Ali Baba , Dauda

    Published 2018
    “…Two messages formats, normal and compressed (modified algorithm) with the size ranging 1MB - 22 MB were generated and executed 50 times in both web services. …”
    Get full text
    Get full text
    Get full text
    Thesis