Search Results - (( program case ((method algorithm) OR (path algorithm)) ) OR ( java application using algorithm ))
Search alternatives:
- method algorithm »
- java application »
- using algorithm »
- path algorithm »
- program case »
-
1
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…This means A • algorithm only calculates and consider the next node m path that has the lowest value of G and F, plus searching the shortest route by using heuristic estimation in Manhattan method. …”
Get full text
Get full text
Thesis -
2
-
3
Optimum Time-Cost Trade-Off Strategies on Critical Path Method for Project Management
Published 2010“…In order to illustrate the usefulness of our approaches, we elaborate our algorithms on six cases of the well-known time-cost trade-off problem. …”
Get full text
Get full text
Thesis -
4
Text messaging encryption system
Published 2012“…The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. …”
Get full text
Get full text
Undergraduates Project Papers -
5
Development of least square adjustment application for traversing / Harith Fadhillah Soeb
Published 2019“…In addition, the development stage started by perform calculation process using MATLAB software. Next, the algorithm for calculation process was generated using the Eclipse application that uses Java programming language. …”
Get full text
Get full text
Thesis -
6
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Secondly, an expert system using Java programming technology with two tiers of search engine was developed to perform a fast selection of candidate materials in huge volume. …”
Get full text
Get full text
Thesis -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Many programming languages are used for programming; Java programming language is known to be most common due to its features, the use of this popular language increases an attacker's ability to steal intellectual property (IP), as the source program is translated to an intermediate format retaining most of the information such as meaningful variables names present in source code. …”
Get full text
Get full text
Thesis -
8
An improved algorithm in test case generation from UML activity diagram using activity path
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
10
Estimation of Transformers Health Index Based on Condition Parameter Factor and Hidden Markov Model
Published 2023Conference Paper -
11
-
12
Network reconfiguration and DG sizing incorporating optimal switching sequence for system improvement / Ola Subhi Waheed Badran
Published 2018“…The chosen optimization techniques in this work include evolutionary programming (EP), particle swarm optimization (PSO), gravitational Search Algorithm (GSA), and firefly algorithm (FA). …”
Get full text
Get full text
Get full text
Thesis -
13
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
14
-
15
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
16
-
17
Case Slicing Technique for Feature Selection
Published 2004“…The classification accuracy obtained from the CST method is compared to other selected classification methods such as Value Difference Metric (VDM), Pre-Category Feature Importance (PCF), Cross-Category Feature Importance (CCF), Instance-Based Algorithm (IB4), Decision Tree Algorithms such as Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5), Rough Set methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) and Neural Network methods such as the Multilayer method.…”
Get full text
Get full text
Thesis -
18
-
19
Online Programming Judge System (UOJ)
Published 2013“…This research conducts a study to build an Online Programming Judge system with a mechanism to generate test cases automatically using Particle Swarm Optimization (PSO) algorithm. …”
Get full text
Get full text
Final Year Project -
20
Propositional satisfiability method in rough classification modeling for data mining
Published 2002“…The classification accuracy, the number of rules and the maximum length of rules obtained from the SIPIDRIP method was compared with other rough set method such as Genetic Algorithm (GA), Johnson, Holte l R, Dynamic and Exhaustive method. …”
Get full text
Get full text
Thesis
