Search Results - (( simultaneously implementation modified algorithm ) OR ( java implementation some algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Interval iterative methods on simultaneous inclusion of polynomial zeros by Mohammad Rusli, Syaida Fadhilah

    Published 2017
    “…The main aim of the thesis is to modified procedures of bounding real zeros of polynomials simultaneously. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Image enhancement and segmentation on simultaneous latent fingerprint detection by Rozita, Mohd Yusof

    Published 2015
    “…A combination of Gabor Filter and Fourier transform is implemented in the normalization stage. In the pre-processing stage, a modified version of Histogram equalization is proposed known as Alteration Histogram Equalization (AltHE). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Simultaneous computation of model order and parameter estimation for ARX model based on single swarm and multi swarm simulated Kalman filter by Kamil Zakwan, Mohd Azmi, Zuwairie, Ibrahim, Pebrianti, Dwi, Mohd Saberi, Mohamad

    Published 2017
    “…Simultaneous Model Order and Parameter Estimation (SMOPE) and Simultaneous Model Order and Parameter Estimation based on Multi Swarm (SMOPE-MS) are two techniques of implementing meta-heuristic algorithm to iteratively establish an optimal model order and parameters simultaneously for an unknown system. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Some Modification on Interval Symmetric Single-Step Procedure for Simultaneous Inclusion of Real Zzeros of Polynomials by Mohammad Rusli, Syaida Fadhilah

    Published 2011
    “…The coding for the algorithms of these procedures are developed and implemented using the MATLAB R2007a in co-operated with the Intlab V5.5 toolbox for interval arithmetic developed by Rump. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Solving delay differential equations using modified 2-point block method by Abdul Aziz, Nurul Huda, Abdul Majid, Zanariah

    Published 2012
    “…This method is based on a pair of explicit and implicit of Adams formulas which are implemented in PE(CE)s mode. The Newton divided difference interpolation has been used to approximate the delay solutions and the algorithm is implemented in variable step size. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    A modified group authentication scheme for machine type communication in LTE/LTE-a networks by Ismail, Haqi Khalid

    Published 2018
    “…Meeting the necessities of control usage of devices and mass implement transmission is a key issue in the implementation of MTC in the Long Term Evolution/Long Term Evolution Advanced systems. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Implementation Of Image Processing Technique In FPGA by Ng, Soo Kheng

    Published 2006
    “…Traditionally, digital signal processing algorithms are implemented using software because of the complexities involved in the operations. …”
    Get full text
    Get full text
    Monograph
  17. 17

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions by Hajighorbani, Shahrooz

    Published 2016
    “…The significant reduction of oscillation in power is observed to be due to implementation of the modified P&O.As a conclusion, the DSMPP algorithm has successfully been performed to detect the GMPP under PSCs in minimum time, with low oscillation in power, and high accuracy as detecting the GMPP for different scenarios of shadowing.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Knowledge-based system developement for the game congkak / Syah Ali Reza Yaacob by Yaacob, Syah Ali Reza

    Published 2006
    “…The original game requires both players to move simultaneously. Therefore, the Minimax algorithm is not applicable. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Implementation of RIO in UMJaNetSim / Chan Chin We by Chan, Chin We

    Published 2004
    “…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
    Get full text
    Get full text
    Thesis