Search Results - (( java implementation some algorithm ) OR ( using execution modified algorithm ))
Search alternatives:
- java implementation »
- implementation some »
- execution modified »
- using execution »
- some algorithm »
-
1
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Ideally, to perform regression testing is to re-execute all the test cases on the modified software. …”
Get full text
Get full text
Thesis -
2
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
A Modified LRE-TL Real-Time Multiprocessor Scheduling Algorithm
Published 2013“…We have conducted an independent-samples t test to compare tasks migration using the original LRE-TL algorithm and the modified algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
5
A modified LRE-TL real-time multiprocessor scheduling algorithm
Published 2014“…We have conducted an independent-samples t-test to compare tasks migration using the original LRE-TL algorithm and the modified algorithm. …”
Get full text
Get full text
Article -
6
A modified n-th section line search in conjugate gradient methods for solving unconstrained optimization / Muhammad Imza Fakhri Jinudin
Published 2018“…All algorithms are written and executed using Maple 16 software. …”
Get full text
Get full text
Thesis -
7
Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment
Published 2018“…The second approach is the modification of heuristic computation using original A* and modified Bresenham. Bresenham Line Algorithm is a line generation algorithm using integer arithmetic where the points (x1, y1) and (x2, y2) are assumed not equal and integer valued. …”
Get full text
Get full text
Get full text
Thesis -
8
Reducing Tasks Migration in LRE-TL Real-time Multiprocessor Scheduling Algorithm
Published 2013“…To verify our work, an independent-samples t-test is used to compare tasks migration using the original LRE-TL algorithm and the modified one. …”
Get full text
Get full text
Conference or Workshop Item -
9
Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing
Published 2023“…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Octopus++: an enhanced mutual authentication protocol with lightweight encryption and decryption algorithm based on dna in fog computing
Published 2023“…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006Get full text
Get full text
Thesis -
12
New algorithm for autonomous dynamic path planning in real-time intelligent robot car
Published 2017“…Different algorithms have been used to address this problem by considering the optimal path with minimum cost; however, these algorithms did not consider the execution time to find such path. …”
Get full text
Get full text
Get full text
Article -
13
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
14
-
15
Block backward differentiation formulas for solving first and second order fuzzy differential equations
Published 2016“…The algorithm of existing BBDF was modified into fuzzy version. …”
Get full text
Get full text
Get full text
Thesis -
16
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
17
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
18
Dynamic obstacle handling in multi-robot coverage
Published 2024“…The simulations were conducted by using MATLAB to demonstrate the superiority of Modified Lloyd’s algorithm with VO over existing Lloyd’s algorithm in terms of average of total number of collisions between robots and dynamic obstacle during coverage task. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
-
20
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis
