Search Results - (( developing affecting generation algorithm ) OR ( java application means algorithm ))
Search alternatives:
- developing affecting »
- affecting generation »
- generation algorithm »
- application means »
- java application »
- means algorithm »
-
1
A web-based implementation of k-means algorithms
Published 2022“…The K-means algorithm has been around for over a century. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
-
3
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
Get full text
Get full text
Journal -
4
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
5
Biometrics electronic purse
Published 1999“…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
7
-
8
Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement
Published 2016“…In previous work, an Adaptive Linear Neuron (ADALINE) based extraction algorithm has been developed to generate reference currents. …”
Get full text
Get full text
Thesis -
9
March-based diagnosis algorithm for static random-access memory stuck-at faults and transition faults
Published 2012“…The fault syndrome based on read operations of the proposed algorithm is generated to determine its diagnostic capability. …”
Get full text
Get full text
Thesis -
10
Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation
Published 2018“…Based on the dynamic shapeless quasigroup and the proposed new string transformation, a Dynamic Key Scheduling Algorithm (DKSA) is developed. To validate the findings, non-associativity of the generated isotopes has been tested and the generated isotopes appeared to be non-associative. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis -
12
New Learning Models for Generating Classification Rules Based on Rough Set Approach
Published 2000“…Thus, the challenge is how to develop an efficient model that can decrease the learning time without affecting the quality of the generated classification rules. …”
Get full text
Get full text
Thesis -
13
Mining Sequential Patterns Using I-PrefixSpan
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Evaluation of new rotor angle deviation regulator for synchronous generator using nonlinear swing equation
Published 2024“…As such, the need to develop a control algorithm for a synchronous generator of power system is crucial. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Prediction models of heritage building based on machine learning / Nur Shahirah Ja'afar
Published 2021“…These algorithms were developed by using prewar shophouses dataset from 2004 until 2018 based on factors of heritage properties. …”
Get full text
Get full text
Thesis -
16
Text messaging encryption system
Published 2012Get full text
Get full text
Undergraduates Project Papers -
17
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
19
Automated bilateral negotiation with incomplete information in the e-marketplace.
Published 2011“…The reason is that, SRT algorithm is sensitive to the accuracy of the learned preferences while MGT algorithm can generate Pareto-optimal offers even with an approximation of the learned preferences.…”
Get full text
Get full text
Thesis -
20
Hardware development of autonomous mobile robot based on actuating lidar
Published 2022“…In some applications such as navigation for blind people, sparse LiDAR point cloud are more applicable as they can be quickly generated and processed. As opposed to a point cloud generated from high-end LiDAR sensors where many algorithms have been developed for object detection, sparse LiDAR point clouds still possess large room for improvement. …”
Get full text
Get full text
Get full text
Article
