Search Results - (( java implementation some algorithm ) OR ( program estimation techniques algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…The EKF algorithm performance was compared with Recursive Least Square (RLS) estimation algorithm as a comparison algorithm performance. …”
    Get full text
    Get full text
    Student Project
  5. 5

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  6. 6
  7. 7
  8. 8

    Novel techniques for voltage stability assessment and improvement in power system / Ismail Musirin. by Musirin, Ismail

    Published 2004
    “…A new Evolutionary programming (EP) based acceleration search algorithm was developed to accelerate the process in estimating maximum load ability in a power system. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…This thesis describes a pre-screening process to identify the bad measurements and the measurement weights before performing the WLS estimation technique employed in SE. The autoregressive (AR) techniques. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Estimating the direction of arrival of the multipath radio signal using Capon technique / Haslinah Ruslan by Ruslan, Haslinah

    Published 1996
    “…The comparison of performance between Bartlett Beamforming and Capon technique in DOA estimation based on actual measured data is presented. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    Voltage and load profiles estimation of distribution network using independent component analysis / Mashitah Mohd Hussain by Mohd Hussain, Mashitah

    Published 2014
    “…This thesis presents research on voltage and load profiles estimation using independent component analysis technique. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Implementation of RIO in UMJaNetSim / Chan Chin We by Chan, Chin We

    Published 2004
    “…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
    Get full text
    Get full text
    Thesis
  18. 18

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Design Optimization of 3-Phase Rectifier Power Transformers by Genetic Algorithm and Simulated Annealing by K.S., Rama Rao, Md Hasan, Khairul Nisak

    Published 2008
    “…A closed form expression for actual phase current waveform of the rectifier transformer is used and a comparison is made with the approximate waveform normally considered for fixing the transformer rating. Two non-linear programming techniques, GA and SA are applied for the estimation of transformer design parameters and the results are compared. …”
    Get full text
    Get full text
    Citation Index Journal