Search Results - (( simulation organization structure algorithm ) OR ( java implementation learning algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Bead-sort algorithm for load shuffling in miniload AS/RS with an open-rack structure by Vasili, Mohammadreza, Tang, Sai Hong, Ismail, Napsiah, Sulaiman, Shamsuddin, Wong, Shaw Voon, Vasili, Mehdi

    Published 2009
    “…Bead-sort algorithm and a cellular automaton (CA) are used for defining and simulating of load shuffling in this AS/RS, respectively. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  9. 9
  10. 10

    Self-organizing network technique for resource allocation and mobility management in LTE femtocell network / Labeeb Mohsin Abdullah by Abdullah, Labeeb Mohsin

    Published 2015
    “…MATLAB and Vienna LTE simulators were used to conduct the experiments for the proposed algorithms, approaches and schemes and also used to verify the results. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    An integrated algorithm of analytical network process with case-based reasoning to support the selection of an ideal football team formation and players by Mohammad Zukuwwan, Zainol Abidin

    Published 2021
    “…The system is organized into two combined components: weight calculation for each player to estimate their strength and simulation for suitable formation when facing opponents. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    An improved energy-efficient clustering protocol to prolong the wireless sensor network lifetime by Alhmood, Ali Abdul-Hussian Hassan

    Published 2021
    “…The simulation results prove that the IEECP prolongs the network lifetime better than Energy efficient clustering protocol based on K-means (EECPK-means)-midpoint algorithm (EECPK-means), Traffic-Aware Channel Access Algorithm (TACAA), and an optimal clustering mechanism based on Fuzzy C-means (OCM–FCM) protocols based on the First node die and Weighted first node die. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Self-Organizing Network technique for resource allocation and mobility management in LTE femtocell network / Labeeb Mohsin Abdullah by Abdullah, Labeeb Mohsin

    Published 2016
    “…MATLAB and Vienna LTE simulators were used to conduct the experiments for the proposed algorithms, approaches and schemes and also used to verify the results……”
    Get full text
    Get full text
    Book Section
  16. 16
  17. 17

    Even-odd scheduling based energy efficient routing for wireless sensor network (WSN) / Muhammad Zafar Iqbal Khan by Khan, Muhammad Zafar Iqbal

    Published 2022
    “…The performance of the proposed routing algorithm has been evaluated through simulations of well-known software MATLAB. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Energy Efficient LEACH (EE-LEACH) Routing Algorithm for Wireless Sensor Networks by Pillay, Kosheila Sundram

    Published 2019
    “…Low energy adaptive clustering hierarchy (LEACH) routing protocol was developed to provide better energy efficiency in WSN due to its structural organization. However, it does not guarantee a balanced selection of cluster heads (CHs) and equal cluster size, resulting in an imbalanced load distribution among the CHs. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A cluster-based hybrid replica control protocol for high availability in data grid by Mabni, Zulaile

    Published 2019
    “…CBH employs a hybrid replication strategy by combining the advantages of two common replica control protocols to improve the performance of the existing protocols. A clustering algorithm has been proposed to group the large nodes into clusters and organize these clusters into a tree structure. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Out-of-core simplification with appearance preservation for computer game applications by Tan, Kim Heok

    Published 2006
    “…The first process is to convert the input data into a memory efficient format. Next, datasets are organized in an octree structure and later partitioned meshes are kept in secondary memory (hard disk). …”
    Get full text
    Get full text
    Thesis