Search Results - (( java implementation some algorithm ) OR ( basic dynamic simulation algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    High performance hierarchical torus network under matrix transpose traffic patterns by Rahman, M.M. Hafizur, Susumu, Horiguchi

    Published 2004
    “…We evaluate the dynamic communication performance of HTN, H3D-mesh, TESH, and mesh networks by computer simulation. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Distance approximation using pivot point in narrow phase collision detection by Sulaiman, Hamzah Asyrani, Bade, Abdullah, Abdullah, Mohd Harun

    Published 2013
    “…The basic idea is to use an AABB for both object triangles and creating a moveable origin point called Dynamic Origin Point (DyOP). …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Dynamic communication performance of the TESH network under nonuniform traffic patterns by Rahman, M.M. Hafizur, Inoguchi, Yasushi, Sato, Yukinori, Miura, Yasuyuki, Horiguchi, Susumu

    Published 2009
    “…We evaluate the dynamic communication performance of TESH, mesh, and torus networks by computer simulation. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Dynamic communication performance of a TESH network under the nonuniform traffic patterns by Rahman, M.M. Hafizur, Inoguchi, Yasushi, Sato, Yukinori, Miura, Yasuyuki, Horiguchi, Susumu

    Published 2008
    “…We evaluate the dynamic communication performance of TESH, mesh, and torus networks by computer simulation. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks by Abdelrahman, Ali Mohamed

    Published 2000
    “…This thesis develops dynamic feedback flow control schemes in ATM networks, with primary focus on point-to-point (unicast) and point-tomUltipoint (multicast) ABR algorithms. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Physically-Based Animation in Performing Accuracy Bouncing Simulation by Loh, Ngiik Hoon

    Published 2020
    “…The needforphysics animation was to produce visually believable animations adhering to the basic laws of physics. Based on the review, the creation of accurate timing simulation in bouncing dynamic was significantly difficult particularlyin setting keyframes. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Dynamic communication performance of a hierarchical torus network under non-uniform traffic patterns by Rahman, M.M. Hafizur, Horiguchi, Susumu

    Published 2004
    “…We evaluate the dynamic communication performance of HTN, H3D-mesh, H3D-torus, TESH, and mesh networks by computer simulation. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Development of 3D Crane PID Controller System via State-space Approach by Zailan, Nur Zuhdi

    Published 2011
    “…This dynamic equation is important for simulating the 2D crane in computer using Matlab and Simulink: software and designing a suitable controller for the 2D crane. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…The EKF algorithm performance was compared with Recursive Least Square (RLS) estimation algorithm as a comparison algorithm performance. …”
    Get full text
    Get full text
    Student Project
  18. 18
  19. 19

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Implementation of RIO in UMJaNetSim / Chan Chin We by Chan, Chin We

    Published 2004
    “…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
    Get full text
    Get full text
    Thesis