Search Results - (( using simulation model algorithm ) OR ( java implementation some algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    Implementation of RIO in UMJaNetSim / Chan Chin We by Chan, Chin We

    Published 2004
    “…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Assessing the simulation performances of multiple model selection algorithm by Yusof, Norhayati, Ismail, Suzilah, Tuan Muda, Tuan Zalizam

    Published 2015
    “…The Autometrics is an algorithm for single equation model selection.It is a hybrid method which combines expanding and contracting search techniques.In this study, the algorithm is extended for multiple equations modelling known as SURE-Autometrics.The aim of this paper is to assess the performance of the extended algorithm using various simulation experiment conditions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation by Chang, Jan Voon

    Published 2015
    “…The main objective of this research is to validate the NIRR algorithm by developing a comprehensive simulation model using Discrete Event Simulation (DES). …”
    Get full text
    Get full text
    Thesis
  12. 12

    Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems by Shakeel Ahmed, Kamboh

    Published 2014
    “…This demonstrates the feasibility of using the FDM and parallel computing to reduce the computational time in the EHD model enabling to simulate the micropumps with very small dimensions of electrodes. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation by Chang, Jan Voon, Ahmad, Idawaty

    Published 2016
    “…The main objective of this research is to validate the NIRR algorithm by developing a comprehensive simulation model using Discrete Event Simulation (DES). …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Ensemble Dual Recursive Learning Algorithms for Identifying Custom Tanks Flow with Leakage by Akib, Afifi, Saad , Nordin, Asirvadam , Vijanth Sagayan

    Published 2010
    “…Relative mass release of the leakage is introduced as the input for the simulation model and the data from the simulation model is taken at real time (on-line) to feed into the recursive algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Modelling and simulation of hysteresis control algorithm for use in single phase ac-to-ac matrix converter / Seri Iryani Mohd Noor by Mohd Noor, Seri Iryani

    Published 2003
    “…This thesis is illustrated by developing computer simulation models of ac-to-ac single phase matrix converter (SPMC) using sinusoidal pulse width modulation (SPWM) technique and another algorithm i.e hysteresis control technique. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Incorporating the range-based method into GridSim for modeling task and resource heterogeneity by Eng, Kailun, Muhammed, Abdullah, Mohamed, Mohamad Afendee, Hasan, Sazlinah

    Published 2017
    “…In this paper, we propose a new simulation model that incorporates the range-based method into GridSim for modeling and simulating heterogeneous tasks and resources in order to capture the inherent heterogeneity of Grid environments that later can be used by other researchers to test their algorithms.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Power Delivery Network Modeling And Simulation By Using Delaunay-Voronoi Triangulation And The Latency Insertion Method by Chin, Wei Chun

    Published 2018
    “…The research is focused into the analysis of PDN by modeling and simulation of the power plane. In the project, power plane is modeled using Delaunay-Voronoi algorithm and for simulation, a fast transient simulation algorithm which is latency insertion method (LIM) is applied. …”
    Get full text
    Get full text
    Monograph
  20. 20