Search Results - (( data implementation from algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Implementation Of Association Technique In Identify The Frequent Pairing Subject From Private Tutor Data by Asnor, Nur Hamizah

    Published 2017
    “…In this project we are doing research on implementation data mining in big data. We have explored about Market Basket Analysis is that consist of the algorithm, technique and implementation method. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    A study of fluctuations and confidence of implementation in genetic algorithm optimized network in data centre by Nurika, O., Hassan, M.F., Zakaria, N., Jung, L.T.

    Published 2018
    “…Study of fluctuation in genetic algorithm has been a sub-objective in genetic algorithm implementations. …”
    Get full text
    Get full text
    Article
  6. 6

    A study of fluctuations and confidence of implementation in genetic algorithm optimized network in data centre by Nurika, O., Hassan, M.F., Zakaria, N., Jung, L.T.

    Published 2018
    “…Study of fluctuation in genetic algorithm has been a sub-objective in genetic algorithm implementations. …”
    Get full text
    Get full text
    Article
  7. 7

    Parallel implementation on improved error signal of backpropagation algorithm by Mohd Aris, Teh Noranis, Sulaiman, Md. Nasir, Mohd Saman, Md. Yazid, Othman, Mohamed

    Published 2002
    “…Data partitioning method, with columnwise block striped and batch mode weight updating strategy, is applied on the BP algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Implementation of hybrid encryption method using caesar cipher algorithm by Tat Wi, Charomie

    Published 2010
    “…As a conclusion, Caesar cipher algorithm can be implemented in hybrid encryption project to make data secure and better.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    Implementation of hybrid encryption method using caesar cipher algorithm by Charomie, Tat Wi

    Published 2010
    “…This method is names after Julius Caesar who using this method to communicate with his generals.The result from this project is a data which is encrypted and be decrypted to its readable form.As a conclusion,Caesar cipher algorithm can be implemented in hybrid encryption project to make data secure and better.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    Enhancing Classification Algorithms with Metaheuristic Technique by Cokro, Nurwinto, Tri Basuki, Kurniawan, Misinem, ., Tata, Sutabri, Yesi Novaria, Kunang

    Published 2024
    “…Classification is a process of grouping or placing data into appropriate categories or classes based on specificattributes or features to predict labels or classes of new data based on patternsobserved from previously trained data. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Traffic management algorithms for LEO satellite networks by Huyop @ Ayop, Fahrul Hakim

    Published 2016
    “…Overall, from all the three experiments that have been conducted, the proposed routing algorithms which have been developed to manage the network traffic have proved better than the previously developed algorithms in several perspectives especially for the implementation of real-time applications in LEO satellite networks.…”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Development of obstable avoidance system for 3D robot navigation by Er, Kai Sheng

    Published 2024
    “…In this project, an algorithm was developed to implement an obstacle avoidance system in 3D robot navigation. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Accelerating graph algorithms with priority queue processor by Heng Sun, Ch'ng, Eik Wee, Chew, Shaikh-Husin, Nasir, Hani, Mohamed Khalil

    Published 2006
    “…Assuming embedded hardware-software codesign, results show that our priority queue processor performs better than software implementation, and the run-time complexity of DijkstraÂ’s algorithm is reduced from O(n lg n) in software implementation to O(n) with our priority queue processor.…”
    Get full text
    Get full text
    Article
  15. 15

    The implementation of z-numbers in fuzzy clustering algorithm for wellness of chronic kidney disease patients by N. J., Mohd Jamal, Ku Muhammad Naim, Ku Khalif, Mohd Sham, Mohamad

    Published 2019
    “…By gleaning insights from the data, fuzzy clustering capable to learn from data, identify patterns and make decision with minimum human intervention. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Parallel implementation on improved error signal of backpropagation algorithm by Mohd Aris, Teh Noranis

    Published 2001
    “…The BP algorithm uses the data partitioning method with columnwise block striped and the batch mode weight updating strategy. …”
    Get full text
    Get full text
    Thesis
  17. 17

    DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE by FLORISCA, ALDINA GODULUS

    Published 2019
    “…Previously, many encryption algorithms have been investigated. The Cryptography Algorithm is used to protect data through encryption that allows sensitive information to be passed through the network safely. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  18. 18

    Implementation of direction control algorithms for fixed wings UAV by Abdalla, Mohamed K., Hassan Abdalla Hashim, Aisha, Attia, Tahani A., Babikir, Sharief F.

    Published 2015
    “…This paper describes algorithms that use the Global Positioning system data to navigate from the current position to the destination point. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Implementation of perez-dumortier calibration algorithm by Jedol Dayou, Chang, Jackson Hian Wui, Justin Sentian

    Published 2014
    “…The governing theory of the algorithm was discussed in the previous chapter. This chapter presents information on how to implement the Perez-Dumotier calibration algorithm using actual field measurement. …”
    Get full text
    Get full text
    Get full text
    Chapter In Book
  20. 20

    Software User Interface and Algorithm Development for Signal and Noise Characterization by Phoong, Wei Siang

    Published 2015
    “…The light is emit to cantilever and reflect the light to photodiode. The data from photodiode is read by LabVIEW software for further develop to obtain useful output data. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis