Search Results - (( java implementation phase algorithm ) OR ( programming using vs algorithm ))
Search alternatives:
- implementation phase »
- java implementation »
- phase algorithm »
- vs algorithm »
- using vs »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
2
Optimizing Visual Surveillance Sensor Coverage Using Dynamic Programming
Published 2017Get full text
Get full text
Article -
3
-
4
Overview of metaheuristic: classification of population and trajectory
Published 2010“…Algorithms are used to find the solutions through the computer program. …”
Get full text
Get full text
Monograph -
5
Highest response ratio next (HRRN) vs first come first served (FCFS) scheduling algorithm in grid environment
Published 2011Get full text
Get full text
Conference or Workshop Item -
6
-
7
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
8
Reservoir system modelling using nondominated sorting genetic algorithm in the framework of climate change
Published 2014“…Whilst, Model B exclude the climate change factor by using Valencia Schaake model (VS) and Thomas Fiering model (TF). …”
Get full text
Get full text
Thesis -
9
-
10
-
11
A stylometry approach for blind linguistic steganalysis model against translation-based steganography
Published 2023“…While targeted steganalysis is designed to attack a specific embedding algorithm, blind steganalysis use features extracted or selection from the medium to detect any anomalies that indicate a possibility that a secret data has been embedded within the medium. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
