Search Results - (( program implementation soft algorithm ) OR ( java implementation case algorithm ))
Search alternatives:
- program implementation »
- implementation soft »
- java implementation »
- implementation case »
- soft algorithm »
- case algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
5
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article -
6
-
7
-
8
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
9
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
11
-
12
A performance comparison of metaheuristics search for university course timetabling problems
Published 2017“…Solutions are considered as feasible if the hard constraints are satisfied, while minimizing the cost of soft constraints as much as possible. In this research, a Constraint Programming (CP) algorithm is proposed and implemented in order to solve the hard constraint while satisfying the soft constraints is handled by using the Great Deluge (GD) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
13
Singular Value Thresholding Algorithm for Wireless Sensor Network Localization
Published 2020“…Common way to tackle this problem is by implementing the Semidefinite Programming (SDP). However, SDP can only handle matrices with a size of less than 100 x 100. …”
Get full text
Article -
14
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
15
Coordination of PSS and PID controller for power system stability enhancement - overview
Published 2023“…This paper broadly reviews the optimization methods and algorithms such as Conventional methods, Soft Computing, Genetic Algorithm (GA), Evolutionary Programming (EP), Differential Evolution (DE) and Swarm Intelligence methods were available for tuning the PID gains and PSS parameters successfully. …”
Article -
16
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…In this research, first the implementation of Analytical Hierarchy Process (AHP) computational tool was explored for deciding optimum material for automotive components. …”
Get full text
Get full text
Thesis -
17
Crypto Embedded System for Electronic Document
Published 2006“…In this paper, a development of low-cost RSA-based Crypto Embedded System targeted for electronic document security is presented. The RSA algorithm is implemented in a re-configurable hardware, in this case Field Programmable Gate Array (FPGA). …”
Get full text
Get full text
Article -
18
Visualisation tool to study malaria transmission using network modelling
Published 2014“…Java was used to implement the visualisation tool. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
19
Development of Automatic Load-Shedding Strategy for Stand-Alone Photovoltaic System
Published 2014“…The circuit of the load-shedding system is designed in the SoftCad Eagle PCB Design software. The algorithm controlling the load-shedding scheme is developed in the Arduino IDE. …”
Get full text
Get full text
Article -
20
The design and implementation of a two and three-dimensional triangular irregular network based GIS
Published 2000“…To facilitate the output of the developed methods and algorithms, software called TinSoft, which is a Windows-based Multiple Document Interface software was developed in this research.…”
Get full text
Get full text
Get full text
Thesis
