Search Results - (( java implementation search algorithm ) OR ( basic dynamic (functional OR function) algorithm ))
Search alternatives:
- implementation search »
- java implementation »
-
1
Computing the autopilot control algorithm using predictive functional control for unstable model
Published 2009“…One basic Ballistic Missile model (10) is used as an unstable model to formulate the control law algorithm using PFC. …”
Get full text
Get full text
Conference or Workshop Item -
2
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
Get full text
Get full text
Journal -
3
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
4
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Heuristic resource allocation algorithm for controller placement in multi-control 5G based on SDN/NFV architecture
Published 2021“…A Greedy Randomized Search (GRS) algorithm was used to solve the dynamic assignment of nodes to controllers to achieve load balancing. …”
Get full text
Get full text
Get full text
Article -
6
A secure message handler using microsoft cryptoapi
Published 2003“…These routines were compiled together to form the Dynamic Link Library (DLL) file. This dll file serves as a reference for any Visual Basic application which needs to call the CtyptoAPI function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
A secure message handler using microsoft cryptoapi
Published 2003“…These routines were compiled together to form the Dynamic Link Library (DLL) file. This dll file serves as a reference for any Visual Basic application which needs to call the CtyptoAPI function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Songs Search Using Human Humming Voice
Published 2007Get full text
Get full text
Final Year Project -
9
Automatic generic process migration system in linux
Published 2012“…A fexible interface to the underlying checkpoint/ restart subsystem is designed which permits users to specify the migration mechanism according to process constraints. A migration algorithm is designed which attempts to exploit the unique features of the basic migration algorithms to form a generic algorithm. …”
Get full text
Get full text
Thesis -
10
The development of semantic meta-database: an ontology based semantic integration of biological databases
Published 2007“…The tool comprises two intelligent algorithms. The first algorithm combines parallel genetic algorithm with the split-and-merge algorithm. …”
Get full text
Get full text
Monograph -
11
Design and Development of a Vision System Interface for Three Degree of Freedom Agricultural Robot
Published 1999“…The recognition process was achieved by using C++ programming language enhanced by MIL functions. An algorithm based on empirical results was developed in order to convert the target coordinates from the image plane (pixel) into the robot plane (cm). …”
Get full text
Get full text
Thesis -
12
Global Algorithms for Nonlinear Discrete Optimization and Discrete-Valued Optimal Control Problems
Published 2009“…One of the more recent global optimization tools in the area of discrete optimization is known as the discrete filled function method. The basic idea of the discrete filled function method is as follows. …”
Get full text
Get full text
Get full text
Thesis -
13
Visualisation tool to study malaria transmission using network modelling
Published 2014“…In addition, the Hypertext Induced Topical Search (HITS) web search algorithm was adapted to implement a search engine, which uses the bipartite contact network as the input. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
14
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Initially, this tool adopts only Crow Search, Jaya, and Sine Cosine algorithms. But more metaheuristics will be included in future research. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
16
Tasks Distribution In Driver Scheduling Using Dynamic Set Of Bandwidth In Harmony Search Algorithm With 2-Opt
Published 2021“…Therefore, a tasks distribution in driver scheduling using dynamic set of bandwidth in harmony search algorithm with 2-opt (SBHS2-opt) was proposed in this research. …”
Get full text
Get full text
Get full text
Thesis -
17
Fuzzy adaptive teaching learning-based optimization for solving unconstrained numerical optimization problems
Published 2022“…This fuzzy-based adaptive selection helps to adequately balance global search or exploration and local search or exploitation operations during the search process as these operations are intrinsically dynamic. The performance of the fuzzy adaptive teaching learning-based optimization is evaluated against other metaheuristic algorithms including basic teaching learning-based optimization on 23 unconstrained global test functions. …”
Get full text
Get full text
Get full text
Article -
18
Adaptive Linear System Identification over Simulated Wireless Environment
Published 2009“…The work looks thoroughly on three forms of instantaneous learning algorithms which are: first order algorithms (e.g. least mean square (LMS)), second order algorithms (e.g. …”
Get full text
Get full text
Thesis -
19
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
20
Model Identification Using Neuro-Fuzzy Approach
Published 2018“…This covers static and dynamic systems. Following that, the idea of developing nonlinear models in the framework of Orhonormal Basis Functions (OBF) is described. …”
Get full text
Get full text
Article
