Search Results - (( java implementation search algorithm ) OR ( changes evaluation based algorithm ))
Search alternatives:
- implementation search »
- java implementation »
- evaluation based »
-
1
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
Get full text
Get full text
Journal -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Songs Search Using Human Humming Voice
Published 2007Get full text
Get full text
Final Year Project -
5
Visualisation tool to study malaria transmission using network modelling
Published 2014“…In addition, the Hypertext Induced Topical Search (HITS) web search algorithm was adapted to implement a search engine, which uses the bipartite contact network as the input. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
6
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Initially, this tool adopts only Crow Search, Jaya, and Sine Cosine algorithms. But more metaheuristics will be included in future research. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
9
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Secondly, an expert system using Java programming technology with two tiers of search engine was developed to perform a fast selection of candidate materials in huge volume. …”
Get full text
Get full text
Thesis -
10
-
11
Objective and Subjective Evaluations of Adaptive Noise Cancellation Systems with Selectable Algorithms for Speech Intelligibility
Published 2018“…Adaptive Noise Cancellation (ANC) systems with selectable algorithms refer to ANC systems that are able to change the adaptation algorithm based on the eigenvalue spread of the noise. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Optimized PID controller of DC-DC buck converter based on archimedes optimization algorithm
Published 2023“…Performance evaluation involves injecting a voltage disturbance into the buck converter with load changes of up to 20%. …”
Get full text
Get full text
Get full text
Article -
13
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…This separation contributes in determining the effect of access point on the network performance as well as it allows in evaluating the algorithms that based on the differentiation between the access point and stations. …”
Get full text
Get full text
Get full text
Thesis -
14
Characterization of digital intra-oral dental radiographs based on image enhancement algorithms (IEAs) / Siti Arpah Ahmad
Published 2018“…Therefore, this research focuses on identifying objective measurements based on dentists’ subjective evaluation on abnormalities in jaw area. …”
Get full text
Get full text
Book Section -
15
Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks
Published 2015“…Algorithms for mutual exclusion in DS are categorized into two main classes including token-based and permission-based algorithms. …”
Get full text
Get full text
Thesis -
16
Improved ADALINE Harmonics Extraction Algorithm for Boosting Performance of Photovoltaic Shunt Active Power Filter under Dynamic Operations
Published 2016“…Steady state operation and three critical dynamic operations, which involve change of nonlinear loads, off-on operation between PV and SAPF, and change of irradiances, were carried out for performance evaluation. …”
Get full text
Get full text
Article -
17
Characterization of digital intra-oral dental radiographs based on image enhancement algorithms (IEAs) / Siti Arpah Ahmad
Published 2017“…Therefore, this research focuses on identifying objective measurements based on dentists' subjective evaluation on abnormalities in jaw area. …”
Get full text
Get full text
Thesis -
18
New perturb and observe algorithm based on trapezoidal rule: uniform and partial shading conditions
Published 2022“…The proposed Trapezoidal rule based P&O algorithm is evaluated under three conditions: (1) under uniform irradiance (2) under shading conditions and (3) under sudden and step changes in irradiation levels as well as the transition between shading patterns. …”
Get full text
Get full text
Article -
19
Evaluation of genetic algorithm based solar tracking system for photovoltaic panels
Published 2008Get full text
Get full text
Conference or Workshop Item -
20
Adaptive method to improve web recommendation system for anonymous users
Published 2011“…Also, the adaptive phase is able to update the web navigation profile(s) based on the interest‟s changes and predict the next visited pages in accurate manner to the anonymous users based on their early stage navigation. …”
Get full text
Get full text
Thesis
