Search Results - (( java implementing science algorithm ) OR ( java implementation among algorithm ))
Search alternatives:
- implementing science »
- implementation among »
- java implementation »
- java implementing »
- among algorithm »
-
1
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
2
Network game (Literati) / Chung Mei Kuen
Published 2003“…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
Get full text
Get full text
Thesis -
3
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
-
5
Network monopoly / Tan Kean Yeap
Published 2002“…The main aspect of this thesis is to produce a network monopoly system, which process multiple game sessions concurrently, enabling users to play the graphical game with people within the network. The algorithm design and implementation method mustnot only be workable, but also highly efficient in terms of execution speed and respond time. …”
Get full text
Get full text
Thesis -
6
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
7
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
8
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
9
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
10
Café Web Based System Using Priority Scheduling Approach
Published 2017Get full text
Get full text
Conference or Workshop Item -
11
Study and Implementation of Data Mining in Urban Gardening
Published 2019Get full text
Get full text
Get full text
Article -
12
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
13
-
14
Cross-site scripting detection based on an enhanced genetic algorithm
Published 2015Get full text
Get full text
Conference or Workshop Item -
15
-
16
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017Get full text
Get full text
Conference or Workshop Item -
17
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017Get full text
Get full text
Conference or Workshop Item -
18
-
19
-
20
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008Get full text
Get full text
Conference or Workshop Item
