Search Results - (( data information system algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1
  2. 2

    Biometric identification with limited data set by Lionnie, Regina, Attamimi, Said, Sediono, Wahju, Alaydrus, Mudrik

    Published 2019
    “…Sometimes, in real life, there is only limited information which can be obtained. This situation can be a challenge for the recognition system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  3. 3

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  4. 4

    Tacit knowledge for business intelligence framework using cognitive-based approach by Surbakti, Herison

    Published 2022
    “…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
    Get full text
    Get full text
    Thesis
  6. 6

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  8. 8

    Boyer-Moore horspool algorithm used in content management system of data fast searching by Chan, Chung Hoong, M. A., Ameedeen

    Published 2017
    “…An enormous amount of data stored in content management system as few big module as product data, slider data, personal information data, company information data, account data and another kind of data may refer to the different type of content management system and developer set. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment by Nanna Suryana, Herman

    Published 2007
    “…This , paper discusses the development of data mining and pattern recognition algorithm to handle the complexity of hyperspectral remote sensing images in Geographical Information Systems environment. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…This system is achieved using the Genetic Algorithm which is capable of performing information retrieval and learning algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH by LUONG, TRUNG TUAN

    Published 2005
    “…The project's objective is identifying the available data mining algorithms in data classification and applying new data mining algorithm to perform classification tasks. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Privacy in medical emergency system: cryptographic and security aspects by Hameed, Shihab A., Yuchoch, Habib, Al-Khateeb, Wajdi Fawzi Mohammed

    Published 2010
    “…Multilevel security is very important in Medical Emergency System MES since a database contained information with a variety of secret data. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An intelligent data mapping for hydrological information system (his) cube data base to cater from various data types by Selamat, Harihodin, Mohd. Rahim, Mohd. Shafry, Daman, Daut

    Published 2004
    “…Information Extraction is a process that extracts information from existing system source and stores into a database. …”
    Get full text
    Get full text
    Monograph
  17. 17
  18. 18
  19. 19

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  20. 20

    A Multi-Criteria Recommendation Technique for Personalized Tourism Experiences by Mustafa, Payandenick, Yin Chai, Wang

    Published 2025
    “…Recommendation systems use algorithms to analyze user data and provide personalized recommendations based on their past behaviour and preferences. …”
    Get full text
    Get full text
    Get full text
    Thesis