Search Results - (( java implementation some algorithm ) OR ( program ((class using) OR (code using)) algorithm ))
Search alternatives:
- java implementation »
- implementation some »
- some algorithm »
- class using »
- code using »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…There is also a need to consider implementing this strategy for dynamic object-oriented languages such as Python, Lisp, and Smalltalk.…”
Get full text
Get full text
Thesis -
3
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Obfuscation is used to convert source code into a program that works the same way but is much harder to read and understand. …”
Get full text
Get full text
Thesis -
4
-
5
Automatic marking system for programming subject
Published 2023“…This project is a web application designed for lecturer that teaching programming subject to automatically mark programming algorithm exercise. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Extracting Object Oriented Software Architecture from C++ Source Code
Published 2000Get full text
Get full text
Thesis -
7
Enhancing teaching and learning through data-driven optimization of servicing code demand and lecturer allocation using WEKA analysis
Published 2025“…This study applies machine learning techniques using the WEKA analytical tool to explore, cluster and classify servicing code applications using a dataset gathered from multiple faculties, and campuses within the Faculty of Business and Management in a selected public university in Malaysia. …”
Get full text
Get full text
Get full text
Article -
8
A STUDY OF PROTECTION SYSTEM TO IMPROVE POWER SYSTEM RELIABILITY USING ATP (ALTERNATIVE TRANSIENT PROGRAM)
Published 2007“…The 'feedback' is a trip signal which will be sent to the circuit breaker to open or reclose. The algorithm of the relay are designed by writing specific code using the MODELS language. …”
Get full text
Get full text
Final Year Project -
9
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…The development process for this simulation is using programming language of Microsoft Visual C I t 6.0 and the coding creation depends on the algorithm flowchart and the formula pseudocode. …”
Get full text
Get full text
Thesis -
10
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
11
Using genetic algorithms to optimise land use suitability
Published 2012“…In this study, under environmentfriendliness objective, based on multi-agent genetic algorithms, was developed a geospatial model for the land use allocation. …”
Get full text
Get full text
Thesis -
12
Reusability techniques in load-flow analysis computer program
Published 2004“…These methodologies made the developed load-flow analysis software flexible for future enhancement. Adding and changing codes and algorithm of the software can be done without affecting much the existing codes and algorithms. …”
Get full text
Get full text
Article -
13
Investigation on the dynamic of computation of semi autonomous evolutionary computation for syntactic optimization of a set of programming codes
Published 2007“…In parallel programming, the challenges in optimizing the codes in general are more than that for serial programming. …”
Get full text
Get full text
Research Report -
14
The impact of virtual reality on programming algorithm courses on student learning outcomes
Published 2024“…In the control class, students apply traditional learning, while the experimental class uses VR-based learning. …”
Get full text
Get full text
Get full text
Article -
15
Parallel computation of maass cusp forms using mathematica
Published 2013“…The latter is developed using an adapted algorithm of Hejhal and Then which is based on implicit automorphy and finite Fourier series. …”
Get full text
Get full text
Thesis -
16
Online Programming Judge System (UOJ)
Published 2013“…The system has the function to judge programming code by evaluating the output that the program produced. …”
Get full text
Get full text
Final Year Project -
17
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
18
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
19
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
20
A heuristics approach for classroom scheduling using genetic algorithm technique
Published 2017“…The algorithm considered the quantity of students in each class, class time, class size, time accessibility in each class and lecturer who in charge of the classes.…”
Get full text
Get full text
Article
