Search Results - (( java implementation some algorithm ) OR ( program during normalization algorithm ))
Search alternatives:
- normalization algorithm »
- during normalization »
- java implementation »
- implementation some »
- some algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
4
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
5
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
6
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
7
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…The prototype has been tested on a laboratory scale for its functionality by measuring the electrical parameters using heating elements as the load, and its ability in transferring data through three communications and monitoring as well as communicating with the SEM from DIS. Index test on the algorithm performance is carried out at different locations and atmospheric for example in an indoor area of KEE 009 laboratory (normal weather), the outdoor area of KEE 009 laboratory in normal weather, multi storey building and during thunderstorm weather. …”
Get full text
Get full text
Thesis -
8
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
9
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
10
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
13
Enhanced dynamic security assessment for power system under normal and fake tripping contingencies.
Published 2019“…The training dataset is built by applying all possible contingencies during normal and fake tripping scenarios to the test system models. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…In excel, a graph has been produced to show the minimum and maximum values of the new dynamic quantum time after setting the parameters of the proposed formula (priority, burst time and the current quantum time). The proposed algorithms (Priority Dynamic Quantum Time and Multi Priority Dynamic Quantum Time Algorithms) are implemented using JAVA programming language and validated using Key Performance Indicators equations. …”
Get full text
Get full text
Thesis -
15
A review of classification techniques for electromyography signals
Published 2023“…To detect neuromuscular abnormalities, these test is very useful.EMG can measures the electrical activity of muscle during rest, slight and forceful contraction. Normally, during rest our muscle tissue does not produce electrical signals. …”
Get full text
Get full text
Get full text
Article -
16
Protection Coordination Toward Optimal Network Reconfiguration and DG Sizing
Published 2019“…The validity of the proposed method is analyzed on three commonly used IEEE 33-bus, 69-bus and 118-bus distribution systems, employing the firefly algorithm (FA) and evolutionary programming (EP) algorithm. …”
Get full text
Get full text
Article -
17
Academic Achievement Prediction Model Using Neural Networks
Published 2002“…The system can predict the result of Programming I subject based on the student's background during the Sijil Pelajaran Malaysia (SPM) examination. …”
Get full text
Get full text
Get full text
Thesis -
18
Reservoir Inflow Forecasting Using Artificial Neural Network and Adaptive Neuro-Fuzzy Inference System Techniques
Published 2007“…Comparisons of different performances of ANFIS models showed that data normalization can improve the model performances during training and testing. …”
Get full text
Get full text
Thesis -
19
Scheduling dynamic cellular manufacturing systems in the presence of cost uncertainty using heuristic method
Published 2016“…Since the proposed models (like similar models in the literature) are likely to fall into local optimum points, a Branch and Bound based heuristic, a hybrid Simulated Annealing and Genetic algorithm, a hybrid Tabu search and Simulated Annealing, a hybrid Genetic algorithm and Simulated Annealing, a hybrid Ant Colony Optimization and Simulated Annealing and a hybrid Multi-layer Perceptron and Simulated Annealing algorithms are developed. …”
Get full text
Get full text
Thesis -
20
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise
