Search Results - (( java implementation search algorithm ) OR ( program identification method algorithm ))
Search alternatives:
- implementation search »
- identification method »
- java implementation »
- method algorithm »
-
1
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
Get full text
Get full text
Journal -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Songs Search Using Human Humming Voice
Published 2007Get full text
Get full text
Final Year Project -
5
Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus
Published 2003“…This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. …”
Get full text
Get full text
Thesis -
6
Visualisation tool to study malaria transmission using network modelling
Published 2014“…In addition, the Hypertext Induced Topical Search (HITS) web search algorithm was adapted to implement a search engine, which uses the bipartite contact network as the input. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
7
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Initially, this tool adopts only Crow Search, Jaya, and Sine Cosine algorithms. But more metaheuristics will be included in future research. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
9
System identification using Extended Kalman Filter
Published 2017“…System identification is getting more intensive from researcher to develop an algorithm with work efficiently and more accurate. …”
Get full text
Get full text
Student Project -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
11
Flow regime identification of particles conveying in pneumatic pipeline using electric charge tomography and neural network techniques
Published 2006“…This research has produced filtered back concentration profiles of each flow regimes owing to the technique of neural network method of flow regime identification.…”
Get full text
Get full text
Thesis -
12
Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants
Published 2019“…Information about chili pests is collected so that it becomes a database that can be used to identify disease pests using the data mining method. The use of data mining algorithms is expected to help in the identification of pests and diseases in chili plants. …”
Get full text
Get full text
Conference or Workshop Item -
13
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Secondly, an expert system using Java programming technology with two tiers of search engine was developed to perform a fast selection of candidate materials in huge volume. …”
Get full text
Get full text
Thesis -
14
Simultaneous Network Reconfiguration and DG Sizing Using Evolutionary Programming and Genetic Algorithm to Minimize Power Losses
Published 2014“…This paper presents an effective method based on Evolutionary Programming (EP) and Genetic Algorithm (GA) to identify the switching operation plan for feeder reconfiguration and distributed generation size simultaneously. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Monotone Data Samples Do Not Always Produce Monotone Fuzzy If- Then Rules: Learning with Ad hoc and System Identification Methods
Published 2017“…Besides that, a constrained non-linear programming method for FIS modelling is suggested, as a variant of the system identification method.…”
Get full text
Get full text
Get full text
Article -
17
Fault location identification in power transmission networks: using novel nonintrusive fault-monitoring systems
Published 2021“…To examine and validate the proposed methodology, various fault types in a sample power system are simulated by using the electromagnetic transient program (EMTP). The simulation results reveal that the proposed methods demonstrate a high success rate of fault-location identification in power transmission networks for NIFM applications.…”
Get full text
Get full text
Get full text
Article -
18
-
19
Biometrics: Facial Recognition
Published 2004“…It also lists the various approaches in handling facial recognition where we see different methods applied and opinions on which method is better and what factors influenced them. …”
Get full text
Get full text
Final Year Project -
20
A Framework for Green Energy Resources Identification and Integration Supported by Real-Time Monitoring, Control, and Automation Applications
Published 2025“…Validation against conventional methods and state-of-the-art algorithms confirmed the superior performance of the proposed approach. …”
Get full text
Get full text
Get full text
Get full text
Thesis
