Search Results - (( data processing problem algorithm ) OR ( java application designing algorithm ))

Refine Results
  1. 1

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…There are many challenges of hidden data in the unused area two within executable files, which is dependencies of the size of the cover file with the size of hidden information, differences of the size of file before and after the hiding process, availability of the cover file after the hiding process to perform normally and detection by antivirus software as a result of changes made to the file. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4
  5. 5

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…Problem of the size of data happen when data cannot be process because of it too complex. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7
  8. 8

    Enhancement of bearing defect diagnosis via genetic algorithm optimized feature selection by Chia, Yee Shin

    Published 2015
    “…In addition, GA has the limitation on generalization which causes the problem of overfitting to the training data. Therefore a correlation-based filtering algorithm is embedded into GA feature selection to solve the over-fitting problem and increase the adaptability of the diagnostic scheme to unpredictable input data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian by Talebian, Seyed Hamid

    Published 2013
    “…Evolutionary multi-objective algorithms are considered as good candidate for solving multi-objective optimization problems and have been applied to variety of problems in different areas. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An improved pheromone-based kohonen self-organising map in clustering and visualising balanced and imbalanced datasets by Azlin, Ahmad, Rubiyah, Yusof, Nor Saradatul Akmar, Zulkifli, Mohd Najib, Ismail

    Published 2021
    “…However, similar to other clustering algorithms, this algorithm requires sufficient data for its unsupervised learning process. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Fuzzy clustering method and evaluation based on multi criteria decision making technique by Sameer, Fadhaa Othman

    Published 2018
    “…The proposed algorithm is used as a pre-processing method for data followed by Gustafson-Kessel (GK) algorithm to classify credit scoring data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System by Nwogbaga, Nweso Emmanuel

    Published 2023
    “…Therefore, offloading a massive amount of data from mobile devices to the fog or cloud introduces another problem of delay in choosing the optimal resources for processing the tasks resulting in incurring delay by the resource allocation algorithms. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Parallel genetic algorithms for shortest path routing in high- performance computing / Mohd Erman Safawie Che Ibrahim by Che Ibrahim, Mohd Erman Safawie

    Published 2012
    “…High-performance computer is important because it is implemented in sectors where distributed parallel computing is needed to solve large scientific problems such as storing and processing large amounts of data. …”
    Get full text
    Get full text
    Thesis
  18. 18

    WCBP: A new water cycle based back propagation algorithm for data classification by Mohd. Nawi, Nazri, Khan, Abdullah, Firdaus, Naim, M. Z., Rehman, Siming, Insaf Ali

    Published 2016
    “…The back-propagation neural network (BPNN) algorithm performs well on many complex data types but it possess the problem of network stagnancy and local minima. …”
    Get full text
    Get full text
    Article
  19. 19

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    A partition based feature selection approach for mixed data clustering / Ashish Dutt by Ashish , Dutt

    Published 2020
    “…This implies that a pre-processing algorithm has to be enforced first and only then some specific data mining methods can be applied to the problems. …”
    Get full text
    Get full text
    Get full text
    Thesis