Search Results - (( ((java using) OR (data using)) context algorithm ) OR ( java implementation phase algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…The system architecture which consists of a user interface, web framework and storage data. D3.js is used as a technology to visualize the result in interactive form or dynamic visualization which is a JavaScript library and Python is a language to program the system. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar by Tengku Jaafar, Tengku Salman Fathi

    Published 2006
    “…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
    Get full text
    Get full text
    Thesis
  5. 5

    CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK by NURSHAZLINA SUHAIMY

    Published 2023
    “…Hence, the priority of data needs to be redefined according to its context to ensure reliability and timeliness of critical data. …”
    text::Thesis
  6. 6
  7. 7

    Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing by Goh, Kwang Yi

    Published 2023
    “…Furthermore, the proposed techniques based on the QLearning algorithm do not consider context-based actions. Thus, these techniques are unable to detect failures that occur due to the improper use of context data, which is becoming an increasingly common issue in mobile applications nowadays. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation by Chang, Jan Voon

    Published 2015
    “…Round Robin scheduling algorithm is the most widely used scheduling algorithm because of its simplicity and fairness. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A multi-layer dimension reduction algorithm for text mining of news in forex / Arman Khadjeh Nassirtoussi by Nassirtoussi, Arman Khadjeh

    Published 2015
    “…On top of a well-rounded multifaceted algorithm, this work contributes a much needed research framework for this context with a test-bed of data that must make future research endeavors more convenient. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Splicing system and their variants with fuzzy algebraic sum / Mohd Pawiro Santono Othman by Othman, Mohd Pawiro Santono

    Published 2023
    “…Moreover, the languages generated by algebraic sum fuzzy splicing systems and their variants are developed by considering the threshold and the languages generated are categorized according to the Chomsky hierarchy. An algorithm is then developed in JAVA using visual code studio software to replace the time-consuming manual computation of the languages generated by algebraic sum fuzzy splicing systems and their variants. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Confidentiality based file attributes and data classification using TsF-KNN by Ali, M., Jung, L.T.

    Published 2015
    “…Many ML algorithms have been proposed to solve different data management issues, but the prediction of the confidential data and non- confidential data in a data file is still a challenging research gap. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    LCSS-Based Algorithm for Computing Multivariate Data Set Similarity: A Case Study of Real-Time WSN Data by Khan, Rahim, Ali, Ihsan, Altowaijri, Saleh, Zakarya, Muhammad, Rahman, Atiq Ur, Ahmedy, Ismail, Khan, Anwar, Gani, Abdullah

    Published 2019
    “…To address this issue, we propose an efficient algorithm to measure the similarity indexes of multivariate data sets using a non-metric-based methodology. …”
    Get full text
    Get full text
    Article
  14. 14

    Analysis and evaluation of various aspects of solar radiation in the Palestinian territories by Ismail M.S., Moghavvemi M., Mahlia T.M.I.

    Published 2023
    “…Each has a distinctive predominant feature, especially in the context of statistical indicators. They were calculated using both the monthly average daily data and the daily data sets. …”
    Article
  15. 15

    Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation by Chang, Jan Voon, Ahmad, Idawaty

    Published 2016
    “…Round Robin scheduling algorithm is the most widely used scheduling algorithm because of its simplicity and fairness [1]. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking by Saravanan, Perumal Shanthi, Balasundaram, Sadhu Ramakrishnan

    Published 2020
    “…There are numerous techniques presented by various researchers to protect the location-context of users. Location cloaking is an often used technique to protect location-contexts. …”
    Get full text
    Get full text
    Article
  17. 17

    Semantic-k-NN algorithm: An enhanced version of traditional k-NN algorithm by Ali, M., Jung, L.T., Abdel-Aty, A.-H., Abubakar, M.Y., Elhoseny, M., Ali, I.

    Published 2020
    “…The k-NN algorithm is one of the most renowned ML algorithms widely used in the area of data classification research. …”
    Get full text
    Get full text
    Article
  18. 18

    Semantic-k-NN algorithm: An enhanced version of traditional k-NN algorithm by Ali, M., Jung, L.T., Abdel-Aty, A.-H., Abubakar, M.Y., Elhoseny, M., Ali, I.

    Published 2020
    “…The k-NN algorithm is one of the most renowned ML algorithms widely used in the area of data classification research. …”
    Get full text
    Get full text
    Article
  19. 19

    Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking by Saravanan, Perumal Shanthi, Balasundaram, Sadhu Ramakrishnan

    Published 2020
    “…There are numerous techniques presented by various researchers to protect the location-context of users. Location cloaking is an often used technique to protect location-contexts. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20