Search Results - (( simultaneously implementation based algorithm ) OR ( java implementation some algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Image enhancement and segmentation on simultaneous latent fingerprint detection by Rozita, Mohd Yusof

    Published 2015
    “…The algorithm utilizes ridge orientation and frequency features based on block-wise pixels. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Simultaneous computation of model order and parameter estimation for ARX model based on single swarm and multi swarm simulated Kalman filter by Kamil Zakwan, Mohd Azmi, Zuwairie, Ibrahim, Pebrianti, Dwi, Mohd Saberi, Mohamad

    Published 2017
    “…Agents interact among them to modify and enhance the solution throughout the search process. Simultaneous Model Order and Parameter Estimation (SMOPE) and Simultaneous Model Order and Parameter Estimation based on Multi Swarm (SMOPE-MS) are two techniques of implementing meta-heuristic algorithm to iteratively establish an optimal model order and parameters simultaneously for an unknown system. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Grid-based simultaneous localization and mapping using Rao-blackwellized particle filter with neural network for mini robots / Norhidayah Mohamad Yatim by Mohamad Yatim, Norhidayah

    Published 2018
    “…Existing methods had implemented either feature-based or occupancy grid map (OG) as map representation. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Fuzzy logic – genetic algorithm based maximum power point tracking in photovoltaic system by Tukeman, Zalifah

    Published 2012
    “…The near optimum design membership functions and control rules were found simultaneously by genetic algorithms (GAs) which are search algorithms based the mechanism of natural selection and genetics. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Real time De-mixing system based on LMS adaptive algorithm for blind two source signals separation by Mehrkanoon, S., Moghavvemi, M., Fariborzi, H.

    Published 2007
    “…Several simulations obtain optimum results of implemented algorithm. An experiment for testing the efficacy of the algorithm in the real-time source separation by high performance computer is presented.…”
    Get full text
    Conference or Workshop Item
  13. 13

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Chaos-based simultaneous compression and encryption for Hadoop by Usama, M., Zakaria, N.

    Published 2017
    “…This paper focuses on the open-source Hadoop framework and proposes a data storage method that efficiently couples data compression with encryption. A simultaneous compression and encryption scheme is introduced that addresses an important implementation issue of source coding based on Tent Map and Piece-wise Linear Chaotic Map (PWLM), which is the infinite precision of real numbers that result from their long products. …”
    Get full text
    Get full text
    Article
  15. 15

    A new algorithm on Graphical User Authentication (GUA) based on multi-line grids by Lashkari, Arash Habibi, Gani, Abdullah, Sabet, Leila Ghasemi, Farmand, Samaneh

    Published 2010
    “…Thereafter a comparative analysis of all Recall-Based algorithms based on attack patterns of graphical user authentication is tabulated. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Implementation of RIO in UMJaNetSim / Chan Chin We by Chan, Chin We

    Published 2004
    “…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
    Get full text
    Get full text
    Thesis
  17. 17

    Fetal QRS complex Detection Algorithm for FPGA Implementation by Ibrahimy, Muhammad Ibn, Reaz, Mamun Bin Ibne, Mohd-Yasin, Faisal, Khoon, T. H., Ismail, Ahmad Faris

    Published 2005
    “…The algorithm is based on crosscorrelation, adaptive thresholding and statistical properties in the time domain. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Multiobjective optimization using weighted sum Artificial Bee Colony algorithm for Load Frequency Control by Naidu, K., Mokhlis, Hazlie, Bakar, Ab Halim Abu

    Published 2014
    “…This paper presents the implementation of multiobjective based optimization of Artificial Bee Colony (ABC) algorithm for Load Frequency Control (LFC) on a two area interconnected reheat thermal power system. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    A study of fluctuations and confidence of implementation in genetic algorithm optimized network in data centre by Nurika, O., Hassan, M.F., Zakaria, N., Jung, L.T.

    Published 2018
    “…The reliability of genetic algorithm may vary based on implementation case, hence it is necessary to investigate its performance pattern for each implementation case. …”
    Get full text
    Get full text
    Article