Search Results - (( ((java using) OR (data using)) conversion algorithm ) OR ( java implementation bat algorithm ))
Search alternatives:
- conversion algorithm »
- java implementation »
- implementation bat »
- bat algorithm »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Teaching and learning via chatbots with immersive and machine learning capabilities
Published 2019“…In order to address these shortcomings, seven text-based conversational chatbots for the students to learn Java in an interactive and engaging manners had been built. …”
Get full text
Get full text
Conference or Workshop Item -
3
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
4
An application of Malay short-form word conversion using levenshtein distance
Published 2020“…While for the conversion algorithm, Levenshtein Distance (LD) is used to measure the similarity. …”
Get full text
Get full text
Get full text
Article -
5
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
An application of Malay short-form word conversion using Levenshtein distance / Azilawati Azizan, NurAine Saidin, Nurkhairizan Khairudin & Rohana Ismail
Published 2020“…While for the conversion algorithm, Levenshtein Distance (LD) is used to measure the similarity. …”
Get full text
Get full text
Get full text
Article -
7
Software Development For Conversion Of Ip To Wireless Atm (Watm)
Published 2002“…In this thesis, we propose the conversion algorithm that leads to a WATM packet assuming to use the TCP/IP protocol as the source. …”
Get full text
Get full text
Thesis -
8
Image Processing Of Digital Mammograms For Breast Cancer Detection And Classification
Published 2018“…This study also aims to develop an algorithm that uses conversion of greyscale image into RGB as an approach to image processing for greyscale image. …”
Get full text
Get full text
Monograph -
9
Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid
Published 2008“…The process of embedding and retracting the data cause the original embedded data to be distorted as a side effect of the current method used. …”
Get full text
Get full text
Thesis -
10
Disparity between theory & practice beyond the worst-case competitive analysis
Published 2019“…In this work, we contribute towards bridging the gap between theory and practice by considering a set of algorithms for online conversion problems and discuss the disparity between the assumed worst case competitive rations and experimentally achieved competitive ratios using real world data. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Secure encryption in network using Data Encryption Standard (DES) for high security transmission
Published 2017“…The objective of this paper is to improve the security data by using DES algorithm. The substitution technique is applied with addition a XOR operator to enhance the DES algorithm as proposed. …”
Get full text
Get full text
Student Project -
12
-
13
Simulation of elliptical core few mode fiber switch in mode division multiplexing for enhancing bandwidth performance
Published 2023“…This switching mechanism uses an elimination algorithm which removes unwanted modes leaving behind the ones with optimum power to propagate data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
The new efficient and accurate attribute-oriented clustering algorithms for categorical data
Published 2012“…Four real-life data sets obtained from University of California Irvine (UCI) machine learning repository and ten synthetically generated data sets are used to evaluate MGR and IG-ANMI algorithms, and other four algorithms are used to compare with these two algorithms. …”
Get full text
Get full text
Thesis -
15
A hybrid P-graph and WEKA approach in decision-making: waste conversion technologies selection
Published 2022“…The focus of this paper is to facilitate equipment selection for municipal solid waste management. P-graph was used to generate the 160 possible structures. Then, using the WEKA software, the data from the feasible structure would be processed and evaluated using the chosen algorithm. …”
Get full text
Get full text
Article -
16
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019“…Previously, many encryption algorithms have been investigated. The Cryptography Algorithm is used to protect data through encryption that allows sensitive information to be passed through the network safely. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
17
DESIGN AND IMPLEMENTATION OF RIPEMD-160 HASH FUNCTION USING VERILOG HDL
Published 2022“…This security algorithm was examined and put into use in this project using an iterative methodology. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
18
Predicting Customer Buying Decisions for Online Shopping with Unbalanced Data Set
Published 2022“…Weka, a data mining tool, provides the facility to classify the data set with different machine learning algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
3D Surface Reconstruction Using Infrared (IR) Signal
Published 2017“…One-Dimensional (1D) to two-dimensional (2D) conversion is carried out by using the angle between collection of each data and the distance between sensor and an object. …”
Get full text
Get full text
Final Year Project -
20
Hybrid shear-warp rendering
Published 1999“…With the zlist-buffer, an object-based scan conversion of polygons requires only a simple modification of the standard polygon scan-conversion algorithm. …”
Get full text
Get full text
Get full text
Article
