Search Results - (( developing ((rules using) OR (code using)) algorithm ) OR ( java application based algorithm ))*
Search alternatives:
- application based »
- java application »
- rules using »
- code using »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis outlines the two different implementation techniques of the existing FLEX algorithm using java based parsers and using a query language for XML. …”
Get full text
Get full text
Thesis -
2
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
3
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis -
4
Automated time series forecasting
Published 2011“…Moving Average, Decomposition, Exponential Smoothing, Time Series Regressions and ARIMA) were used.The algorithm was developed in JAVA using up to date forecasting process such as data partition, several error measures and rolling process.Successfully, the results of the algorithm tally with the results of SPSS and Excel.This automatic forecasting will not just benefit forecaster but also end users who do not have in depth knowledge about forecasting techniques.…”
Get full text
Get full text
Get full text
Monograph -
5
Network game (Literati) / Chung Mei Kuen
Published 2003“…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
6
JTAGGER
Published 2006“…In this project, rule-based tagging algorithm is used as the mechanism to develop the system which named JTagger. …”
Get full text
Get full text
Final Year Project -
7
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
8
Algorithm analyzer to check the efficiency of codes
Published 2011“…This paper described how software metrics can be used in analyzing efficiency of the developed code in early stage of development. …”
Get full text
Get full text
Conference or Workshop Item -
9
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
10
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
11
Numerical solutions of linear fredholm integro-differential equations of the second kind using quadrature-difference methods
Published 2016“…The system of linear algebraic equation will be solved by using Gauss elimination method. An algorithm and a coding of the proposed methods are developed in this thesis. …”
Get full text
Get full text
Thesis -
12
Applying case reuse and Rule-Based Reasoning (RBR) in object-oriented application framework documentation: Analysis and design
Published 2023Subjects:Conference Paper -
13
Implementation and simplification of an Output Shifted Coding Modulation (OSCM) on a high speed DSP processor / Roslina Mohamad, Wan Nor Syafizan Wan Muhamad and Rosmalini Abdul Ka...
Published 2009“…This algorithm also shows that by using low constraint length convolutional component codes, it can outperform the convolutional codes using Viterbi decoders with much higher constraint lengths. …”
Get full text
Get full text
Research Reports -
14
Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool
Published 2018“…From the data analysis using WEKA software, the production rules classifier (PART) is found to be the most accurate classification algorithm in classifying the emotion which yields the highest precision percentage of 99.6% compared to J48 (99.5%) and Naïve Bayes (96.2%). …”
Get full text
Get full text
Thesis -
15
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
16
Design Rule Check To Validate Option Metal And Via For A Preprogrammed Layout Design
Published 2014“…In order to enable the modification to be made quickly and enable worst case check, Practical Extraction and Report Language (PERL) programming used to automate the code. The result is shown by drawing the test pattern with design rule. …”
Get full text
Get full text
Thesis -
17
Static analysis of Android apps for lifecycle conformance
Published 2017“…In addition, a novel code analysis algorithm is presented to show how Android application source code can be analyzed in order to verify that system resources have been correctly initiated and released. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Development of open platform controller for step-NC compliant CNC system
Published 2020“…Therefore, this study covers the system which has been designed and developed from outdated and conventional PROLIGHT 1000 Milling CNC machine from Light Intelitek as the lesser cost solution which further discussed in detail based upon upgrades of hardware, architecture, and algorithm design. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
POWER QUALITY CLASSIFICATION WITH DE-NOISING SCHEME USING WAVELET TRANSFORM AND RULE- BASED METHOD
Published 2012“…Unique features from the I", 4t h ,7th and 8thl evel details are obtained as criteria for developing a Rules-Based Algorithm for classifying disturbances that have occurred. …”
Get full text
Get full text
Thesis -
20
Improving explicit aspects extraction in sentiment analysis using optimized ruleset / Mohammad Ahmad Jomah Tubishat
Published 2019“…The algorithm was then applied to the full set of 126 rules. …”
Get full text
Get full text
Get full text
Thesis
