Search Results - (( data selection modified algorithm ) OR ( java _ implementation algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  3. 3

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  4. 4

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Fuzzy clustering method and evaluation based on multi criteria decision making technique by Sameer, Fadhaa Othman

    Published 2018
    “…For the third problem a modified of Kohonen Network (MKN) algorithm was proposed to select the initial centres of clusters. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Improving on the network lifetime of clustered-based wireless sensor network using modified leach algorithm by Zeni, Saltihie

    Published 2012
    “…Then, the modified LEACH algorithm was proposed where the improvement was done in cluster head selection based on LEACH. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Modified Kohonen network algorithm for selection of the initial centres of Gustafson-Kessel algorithm in credit scoring by Sameer, Fadhaa Othman, Abu Bakar, Mohd Rizam

    Published 2017
    “…A good clustering analysis implemented by good Initial Centres of clusters should be selected. To overcome this problem of Gustafson-Kessel (GK) algorithm, we proposed a modified version of Kohonen Network (KN) algorithm to select the initial centres. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
    Get full text
    Get full text
    Get full text
    Book
  11. 11
  12. 12

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…The second agent is a reliability evaluation agent that uses a recursive algorithm to predict the suitability generator based on the frequency and duration reliability indices in each state while the third agent is the storage and transfer of data between the other two agents. …”
    Get full text
    Get full text
    Thesis
  13. 13

    The Bacterial Foraging Optimisation Algorithm using Prototype Selection and Prototype Generation for Data Classification by Faizol, Bin Mohd Suria

    Published 2020
    “…However, none of the available works had proposed BFOA as a classification algorithm despite of its good performance. Thus, this study aims to adopt and modify the BFOA into Instance Selection (IS) classifier by manipulating its global search capability and high convergence rate for data classification problem. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Facial features point localization using modified SIFT scale space / Zulfikri Paidi by Paidi, Zulfikri

    Published 2020
    “…Three tests were used on the original SIFT algorithm and modified SIFT. The first test is to evaluate the accuracy of the built-in vector feature. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Feature fusion using a modified genetic algorithm for face and signature recognition system by Suryanti, Awang

    Published 2015
    “…A modified fitness function in Wrapper GA was introduced by adding a function to maintain the balanced of the selected features. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Study Of Modified Training Algorithm For Optimized Convergence Speed Of Neural Network by Kang, Miew How

    Published 2016
    “…Two modified algorithms are proposed in this research, which are mixture of the momentum algorithm with different learning rate algorithms. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Feature selection for high dimensional data: An evolutionary filter approach. by Yahya, Anwar Ali, Osman, Addin, Ramli, Abdul Rahman, Balola, Adlan

    Published 2011
    “…Approach: In this study, we proposed an adapted version of genetic algorithm that can be applied for feature selection in high dimensional data. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    An ensemble of neural network and modified grey wolf optimizer for stock prediction by Das, Debashish

    Published 2019
    “…Additionally, the research restricts the number of variables through feature selection to enhance the performance of the algorithm. …”
    Get full text
    Get full text
    Thesis