Search Results - (( java implementation new algorithm ) OR ( knowledge solution using algorithm ))
Search alternatives:
- java implementation »
- implementation new »
- knowledge solution »
- using algorithm »
- solution using »
- new algorithm »
-
1
-
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
Review -
5
Overview of metaheuristic: classification of population and trajectory
Published 2010“…Algorithms are used to find the solutions through the computer program. …”
Get full text
Get full text
Monograph -
6
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
7
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
8
Biometrics electronic purse
Published 1999“…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
Get full text
Get full text
Get full text
Proceeding Paper -
9
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…The proposed algorithms (Priority Dynamic Quantum Time and Multi Priority Dynamic Quantum Time Algorithms) are implemented using JAVA programming language and validated using Key Performance Indicators equations. …”
Get full text
Get full text
Thesis -
10
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
Get full text
Get full text
Thesis -
11
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
12
The impact of population size on knowledge acquisition in genetic algorithms paradigm: Finding solutions in the game of Sudoku
Published 2010“…Population size is an important component in genetic algorithms (GAs).The concept of population in GAs has contributed to a unique searching strategy which empower its search process through the massive volume of the data in a population.The purpose of this study is to see how the impact of population size on genetic algorithms in producing correct solution for a Sudoku puzzle.Sudoku is a Japanese number puzzle game that has become a worldwide phenomenon.The puzzle involves completing a grid of cells by assigning a single number to each cell.The numbers in a row or a column must consist of any one of the numbers from 1 to 9; no repetition is allowed.GA will be used to generate the correct solution of Sudoku puzzles.The mechanism to produce legal Sudoku grid will follow the requirements needed and meet all the constraints.A fitness function is designed to evaluate legal grids and GA will be tested for performance and time efficiency.The challenges lie on how GA will represent a Sudoku grid in the process and the effectiveness of its operators such as crossover and mutation.The results show how different population size can produce different solutions.The best performance is observed at 500 population size.The paper will conclude with an insight of this value and its significance to the knowledge acquisition in GA paradigm..…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah
Published 2022“…The algorithm introduces the fuzzy Pareto dominance concept to compare two solutions and uses the scalar decomposition method when one solution cannot dominate the other in terms of the fuzzy dominance level. …”
Get full text
Get full text
Get full text
Thesis -
14
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks
Published 2022“…The algorithm introduces the fuzzy Pareto dominance concept to compare two solutions and uses the scalar decomposition method when one solution cannot dominate the other in terms of the fuzzy dominance level. …”
Get full text
Get full text
Get full text
Thesis -
15
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…For this reason, the task of this paper becomes difficult. In this paper a new method is implementing to hide a file of unused area 2 within .EXE file and to detect the hidden file. …”
Get full text
Get full text
Get full text
Article -
16
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…The system trains the NN on previously labelled data, and its knowledge is used to calculate the core online-offline clustering block error. …”
Get full text
Get full text
Thesis -
17
Enhancement on the modified artificial bee colony algorithm to optimize the vehicle routing problem with time windows
Published 2022“…The proposed algorithm was evaluated using benchmark datasets comprising 56 VRPTW instances and 56 Pickup and Delivery Problems with Time Windows (PDPTW). …”
Get full text
Get full text
Thesis -
18
DEVELOPMENT OF A MULTI-OBJECTIVE OPTIMZATION FRAMEWORK FOR INDUSTRIAL PROCESSES
Published 2014“…In addition, the solution characteristics produced by these algorithms were also analysed and its influence on the algorithmic performance was ascertained. …”
Get full text
Get full text
Thesis -
19
-
20
Batch mode heuristic approaches for efficient task scheduling in grid computing system
Published 2016“…Many algorithms have been implemented to solve the grid scheduling problem. …”
Get full text
Get full text
Get full text
Thesis
