Search Results - (( java implementation some algorithm ) OR ( program estimation technique algorithm ))
Search alternatives:
- estimation technique »
- java implementation »
- implementation some »
- some algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
Published 2019“…The extended MILP technique is able to provide an automatic security estimation tool by giving accurate results. …”
Get full text
Get full text
Get full text
Article -
4
System identification using Extended Kalman Filter
Published 2017“…The EKF algorithm performance was compared with Recursive Least Square (RLS) estimation algorithm as a comparison algorithm performance. …”
Get full text
Get full text
Student Project -
5
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
6
-
7
-
8
Novel techniques for voltage stability assessment and improvement in power system / Ismail Musirin.
Published 2004“…A new Evolutionary programming (EP) based acceleration search algorithm was developed to accelerate the process in estimating maximum load ability in a power system. …”
Get full text
Get full text
Thesis -
9
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
10
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
11
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
12
Power System State Estimation In Large-Scale Networks
Published 2010“…This thesis describes a pre-screening process to identify the bad measurements and the measurement weights before performing the WLS estimation technique employed in SE. The autoregressive (AR) techniques. …”
Get full text
Get full text
Thesis -
13
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…This algorithm is used to estimate the maximum loadability point in power system. …”
Get full text
Get full text
Thesis -
14
Estimating the direction of arrival of the multipath radio signal using Capon technique / Haslinah Ruslan
Published 1996“…The comparison of performance between Bartlett Beamforming and Capon technique in DOA estimation based on actual measured data is presented. …”
Get full text
Get full text
Thesis -
15
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
16
Voltage and load profiles estimation of distribution network using independent component analysis / Mashitah Mohd Hussain
Published 2014“…This thesis presents research on voltage and load profiles estimation using independent component analysis technique. …”
Get full text
Get full text
Thesis -
17
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
18
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
-
20
Design Optimization of 3-Phase Rectifier Power Transformers by Genetic Algorithm and Simulated Annealing
Published 2008“…A closed form expression for actual phase current waveform of the rectifier transformer is used and a comparison is made with the approximate waveform normally considered for fixing the transformer rating. Two non-linear programming techniques, GA and SA are applied for the estimation of transformer design parameters and the results are compared. …”
Get full text
Get full text
Citation Index Journal
