Search Results - (( java information sources algorithm ) OR ( using function using algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…The recent trend of software development uses OO paradigm. Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Constrained clustering approach to aid in remodularisation of object-oriented software systems / Chong Chun Yong by Chong, Chun Yong

    Published 2016
    “…Apart from the explicit clustering constraints from domain experts, other sources of information to guide and improve clustering results can be derived implicitly from the source code itself. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions by Abbas, Iraq Tareq

    Published 2018
    “…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources by Al-Qadhi, Abdulrahman K., Athauda, Rukshan, Latip, Rohaya, Hussin, Masnida

    Published 2026
    “…Next, the Dynamic Demand Replacement Algorithm (DDRA) algorithm is used to place in-demand functions near the edge nodes periodically, while the proposed task scheduling algorithm - Maximum Revenue Bid (MRB) is used to give priority to tasks to maximise revenue near the edge. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms by Alzaeemi, Shehab Abdulhabib, Tay, Kim Gaik, Huong, Audrey, Sathasivam, Saratha, Majahar Ali, Majid Khan

    Published 2023
    “…The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA), Evolution Strategy Algorithm (ES), Differential Evolution Algorithm (DE), and Evolutionary Programming Algorithm (EP). …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Computing the autopilot control algorithm using predictive functional control for unstable model by H. A., Kasdirin, J. A., Rossiter

    Published 2009
    “…This paper discusses the computing development of a control algorithm using Predictive Functional Control (PFC) for model-based that having one or more unstable poles. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17
  18. 18

    Determining the preprocessing clustering algorithm in radial basis function neural network by S.L. Ang, H.C. Ong, H.C. Law

    Published 2008
    “…Radial Basis Function Networks have been widely used to approximate and classify data. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms by Shehab Abdulhabib Alzaeemi, Shehab Abdulhabib Alzaeemi, Kim Gaik Tay, Kim Gaik Tay, Audrey Huong, Audrey Huong, Saratha Sathasivam, Saratha Sathasivam, Majahar Ali, Majid Khan

    Published 2023
    “…The SRBFNN’s objective function that corresponds to Satisfiability logic programming can be minimized by different algorithms, including Genetic Algorithm (GA), Evolution Strategy Algorithm (ES), Differential Evolution Algorithm (DE), and Evolutionary Programming Algorithm (EP). …”
    Get full text
    Get full text
    Get full text
    Article