Search Results - (( simulation implementation re algorithm ) OR ( java implementation learning algorithm ))
Search alternatives:
- simulation implementation »
- implementation learning »
- java implementation »
- learning algorithm »
- implementation re »
- re algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
An experimental study of neighbourhood based metaheuristic algorithms for test case generation satisfying the modified condition / decision coverage criterion
Published 2018“…Late Acceptance Hill Climbing (LAHC) and the Great Deluge Algorithm (GDA) which are our new implementation, Simulated Annealing (SA) and Hill Climbing (HC) are re-implemented to generate test cases satisfying MC/DC criterion for comparative analysis. …”
Get full text
Get full text
Thesis -
3
A backward recovery mechanism in preemptive utility accrual real time scheduling algorithm
Published 2010“…The performances of these algorithms are measured by using discrete event simulation. …”
Get full text
Get full text
Article -
4
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
Get full text
Get full text
Get full text
Thesis -
6
-
7
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
8
TDMA scheduling analysis of energy consumption for iot wireless sensor network
Published 2019“…Finally, represent the difference between experimental results and the old results of E-T-DRAND will determine if the algorithm has been efficiently re-implemented.…”
Get full text
Get full text
Thesis -
9
An Enhanced Simulated Annealing Routing Algorithm for Semi-Diagonal Torus Network
Published 2017“…The solution is further refined by re-routing all nets in different orders using simulated annealing method. …”
Get full text
Get full text
Get full text
Article -
10
Improving utility and recovery algorithms for adaptive real time system in multiprocessor environment
Published 2012“…Simulation results reveal that the proposed algorithms outperforms the existing algorithm for the entire load range. …”
Get full text
Get full text
Thesis -
11
Comparative Analysis of Neighborhood based Meta-heuristic Algorithms for MC/DC Test Data Generation
Published 2016“…In order to help test engineers to make informed decision on the best neighborhood based implementations, this paper investigates the size and time performance of two MC/DC test strategies re-implementation based on Simulated Annealing against two newly developed strategies based on Great Deluge and Late Acceptance Hill Climbing algorithms respectively. …”
Get full text
Get full text
Conference or Workshop Item -
12
Design and analysis of sequence generator module using eulerian path algorithm for DNA fragment assembly / Mustaqim Mohd Subri
Published 2013“…For FPGA design flow, RTL schematic, synthesis schematic and simulation are done using Xilinx Vivado software. For ASIC design flow, VCS is used to re-verify the DNASGM module, DC is used to re-synthesis the DNASGM with additional constraints and PT for performing STA on the DNASGM. …”
Get full text
Get full text
Student Project -
13
Design and analysis multiple paths trace back and reconstruction module for DNA sequence alignment accelerator using ASIC design flow / Nurul Ain Husaini
Published 2010“…Second objective is to perform the timing analysis and third objective to implement the design using ASIC flow. The design was developed in VerilogHDL coding, simulated and synthesized using Xilinx ISE 12 and then re-implemented using Synopsys ASIC Tools implies the timing diagram and analyzes using the Design Compiler and Integrated circuit compiler to produce the layout. …”
Get full text
Get full text
Student Project -
14
Traffic management algorithms for LEO satellite networks
Published 2016“…In order to evaluate the proposed algorithm, a series of experiments to implement Discrete Event Simulation (DES) of a LEO satellite network by using ns-2 and C/C++ are conducted. …”
Get full text
Get full text
Get full text
Thesis -
15
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
16
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
17
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
18
An integrated reservoir modelling and evolutionary algorithm for optimizing field development in a mature fractured reservoir
Published 2016“…The second method is automatic optimization using Genetic Algorithm. That depends on the principle of natural selection as proposed by Darwin The genetic program was coupled with the reservoir flow model to re-evaluate the chosen wells at each iteration until obtaining the optimal choice. …”
Get full text
Get full text
Conference or Workshop Item -
19
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
20
A new teaching learning artificial bee colony based maximum power point tracking approach for assessing various parameters of photovoltaic system under different atmospheric condit...
Published 2024“…Hence, many countries are trying to implement renewable/sustainable energy sources to preserve the environment. …”
Get full text
Get full text
Thesis
