Search Results - (( java implementation search algorithm ) OR ( using ((class using) OR (code using)) algorithm ))
Search alternatives:
- implementation search »
- java implementation »
- class using »
- code using »
-
1
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
Get full text
Get full text
Journal -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Effective and efficient attendance tracking system using secret code
Published 2023Conference Paper -
5
Songs Search Using Human Humming Voice
Published 2007Get full text
Get full text
Final Year Project -
6
Solving Boundary Value Problems for Ordinary Differential Equations Using Direct Integration and Shooting Techniques
Published 1999“…Numerical results are discussed indicating the advantages of BVPDI code over COLNEW. The success of the BVP DI code applied to the general class of BVPs is the motivation to con sider the same code for a special class of second order BVPs called Sturm-Liouville (SL) problems. …”
Get full text
Get full text
Thesis -
7
Performance Evaluation Of Combined Code-Space Division Multiple Access With Enhanced Parallel Interference Cancellation
Published 2007“…When a new user requests for a channel, the BS first checks the available signatures in terms of codes and Angle of Arrival (AoA); it then assigns the user with an already used code (used by other users) if they are spatially orthogonal to each other, otherwise an available new code will be assigned. …”
Get full text
Get full text
Thesis -
8
Visualisation tool to study malaria transmission using network modelling
Published 2014“…In addition, the Hypertext Induced Topical Search (HITS) web search algorithm was adapted to implement a search engine, which uses the bipartite contact network as the input. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
9
Optimization of coded signals based on wavelet neural network
Published 2015“…We performed evaluation using 13-bit, 35-bit and 69-bit Barker codes as signal codes to WNN. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
New classes of block backward differentiation formula for solving stiff initial value problems
Published 2013“…The BDF still remain a foundation for most widely used algorithms. In this thesis, new classes of block methods are developed for the solution of sti® initial value problems. …”
Get full text
Get full text
Thesis -
11
-
12
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Obfuscation involves transforming potentially revealing data, renaming useful classes and variables (identifiers) names to meaningless labels or adding unused or meaningless code to an application binary. …”
Get full text
Get full text
Thesis -
13
Enhancement of feature sets for subjectivity analysis on Malay-English code-switching text
Published 2023“…In the unified code-switching feature set, the extracted Malay and English features were unified using an adapted algorithm known as the Malay-English Unified POS. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Constrained clustering approach to aid in remodularisation of object-oriented software systems / Chong Chun Yong
Published 2016“…Even if maintainers possess additional information that could be useful to guide and improve the clustering results, traditional clustering algorithms have no way to take advantage of this information. …”
Get full text
Get full text
Thesis -
15
Using genetic algorithms to optimise land use suitability
Published 2012“…In this study, under environmentfriendliness objective, based on multi-agent genetic algorithms, was developed a geospatial model for the land use allocation. …”
Get full text
Get full text
Thesis -
16
Multi-class classification automated machine learning for predicting earthquakes using global geomagnetic field data
Published 2025“…Through statistical analysis, important features were extracted and a multi-class classification model using geomagnetic data was created. …”
Get full text
Get full text
Get full text
Article -
17
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Initially, this tool adopts only Crow Search, Jaya, and Sine Cosine algorithms. But more metaheuristics will be included in future research. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
19
A Modified Hopfield Neural Network Algorithm (MHNNA) Using ALOS Image for Water Quality Mapping
Published 2016“…The second group was used to test the MHNNA efficiency. After mapping, the locations of the second group in the produced classes were detected. …”
Get full text
Get full text
Get full text
Article -
20
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis
