Search Results - (( based information needs algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- based information »
- java application »
- needs algorithm »
-
1
Implementation of AES algorithm into information investigation autopsy (IIA) / Ahmad Wafiy Hamad Zaki
Published 2013“…Information Investigation Autopsy (IIA) is the tools that can captured the information needed on the Local Area Network environment and later needed to be secured, the IIA need a module that can to secure the evidence captured from any harm. …”
Get full text
Get full text
Student Project -
2
Designing New Block Cipher Based On Genetic Algorithm Approach
Published 2024“…Based on the results, it is proven that the new proposed block cipher algorithm has successfully passed all the security requirements needed. …”
Article -
3
Agent-based extraction algorithm for computational problem solving
Published 2015“…The tool is used to evaluate the accuracy of the proposed extraction algorithm to extract the appropriate information which are needed. …”
Get full text
Get full text
Thesis -
4
TRIP PLANNER MOBILE APPLICATION FOR SARAWAK TOURIST WITH USING INTELLIGENT AGENT BASED DECISION MAKING ALGORITHMS
Published 2020“…Nowadays, technology has become an essential need in almost every aspect of our lives. The internet becomes the main source of information for user to plan the trip. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
5
What drives Chinese youth to use fitness-related health information on social media? an analysis of intrinsic needs, social media algorithms, and source credibility
Published 2024“…Additionally, social media algorithms moderated the relationship between the need for relatedness and fitness-related health information behavior. …”
Get full text
Get full text
Get full text
Article -
6
A block cipher based on genetic algorithm
Published 2016“…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
Get full text
Get full text
Get full text
Thesis -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
8
Influence maximisation towards target users and minimal diffusion of information based on information needs
Published 2020“…This study proposes the Information Diffusion towards Target Users (IDTU) algorithm to enhance influencer selection while minimizing the DC. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
Get full text
Get full text
Get full text
Article -
10
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
11
Mobile Map-Based Positioning System Using Segmentation Algorithm (MM-BPS)
Published 2008“…This paper reports steps to build a segmentation positioning algorithm and to implement Mobile Map-Based Positioning System prototype.…”
Get full text
Get full text
Get full text
Thesis -
12
Adaptive firefly algorithm for hierarchical text clustering
Published 2016“…In order to refine the obtained clusters, a second algorithm, termed as Weight-based Firefly Algorithm with Relocate (WFAR), is proposed. …”
Get full text
Get full text
Get full text
Thesis -
13
Relationship based replication algorithm for data grid
Published 2014“…Such an approach overcomes existing algorithms that is based either on users request or resource capabilities as an individual. …”
Get full text
Get full text
Monograph -
14
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
15
Determination of the best single imputation algorithm for missing rainfall data treatment
Published 2016“…Consequently, a competent imputation algorithm for missing data treatment algorithm is very much needed. …”
Get full text
Get full text
Get full text
Article -
16
Determination of the Best Single Imputation Algorithm for Missing Rainfall Data Treatment
Published 2016“…Consequently, a competent imputation algorithm for missing data treatment algorithm is very much needed. …”
Get full text
Get full text
Get full text
Article -
17
-
18
Map navigation for mobile tourist / Rohana Abd Jalil
Published 2007“…This system is used an rule base algorithm to get an output. The result of this system is come out with the prototype system that adapts the rule base algorithm. …”
Get full text
Get full text
Thesis -
19
-
20
