Search Results - (( data implementation some algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- data implementation »
- implementation some »
- java application »
- some algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010“…As a conclusion, Caesar cipher algorithm can be implemented in hybrid encryption project to make data secure and better.…”
Get full text
Get full text
Undergraduates Project Papers -
3
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010“…This method is names after Julius Caesar who using this method to communicate with his generals.The result from this project is a data which is encrypted and be decrypted to its readable form.As a conclusion,Caesar cipher algorithm can be implemented in hybrid encryption project to make data secure and better.…”
Get full text
Get full text
Undergraduates Project Papers -
4
-
5
Attribute related methods for improvement of ID3 Algorithm in classification of data: A review
Published 2020“…Nevertheless, there are some limitations in ID3 algorithm that can affect the performance in the classification of data. …”
Get full text
Get full text
Get full text
Article -
6
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
7
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
8
-
9
A Comparative Study Of Blockchain Algorithms For Non-Fungible Token
Published 2023“…In this research, there will be some selected algorithms, which is Proof-of-Work and Proof-of-Stakes from open resource and modified to the suitable testing criteria to evaluate valid and sufficient data for data visualization. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Test Data Generation for Event Driven System Using Bees Algorithm
Published 2013“…In this paper we discuss and proposed a new strategy for generating test data for event-driven system using a bio inspired artificial intelligent, namely Bees Algorithm (BA). …”
Get full text
Get full text
Conference or Workshop Item -
11
A hybrid algorithm for finding shortest path in network routing.
Published 2009Get full text
Article -
12
Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms
Published 2014“…Some clustering algorithms, especially those that are partitioned-based, clusters any data presented to them even if similar features do not present. …”
Get full text
Get full text
Get full text
Article -
13
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
14
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
15
Three-term backpropagation algorithm for classification problem
Published 2006“…Despite the general success of this algorithm, there are several drawbacks and limitations which some of them are the existence of local minima, slow rates of convergence and some of the modification of BP algorithm requires complex and costly calculations at each iteration, which offset their faster rates of convergence. …”
Get full text
Get full text
Thesis -
16
Development of heuristic task scheduling algorithm in cloud computing
Published 2016“…To this direction, in this paper we make a summary of some scheduling algorithms and propose an Enhanced Greedy Heuristic Scheduling Algorithm (EGHSA) for task scheduling adapted for big data applications. …”
Get full text
Get full text
Proceeding Paper -
17
Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems
Published 2018“…The MTS algorithm is coded in ANSI-C language and tested on benchmark data from Mandl's Swiss Network and Mumford's larger data. …”
Get full text
Get full text
Thesis -
18
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…RSA cryptosystem is an information security algorithm used for encrypting and decrypting of digital data in order to protect the content of the data and to ensure its privacy. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Outdoor marker-less tracking and pose calculating system for mobile augmented reality
Published 2014“…A proof of concept mobile AR system is implemented as part of this thesis. Experiments and many evaluations are conducted to validate the proposed algorithms on iPhone. …”
Get full text
Get full text
Thesis -
20
Improving on the network lifetime of clustered-based wireless sensor network using modified leach algorithm
Published 2012“…This document is a study about LEACH algorithm where the implementation was done using OMNeT++ network simulator to study the performance of this algorithm in term of network lifetime. …”
Get full text
Get full text
Get full text
Get full text
Thesis
