Search Results - (( developing affective computing algorithm ) OR ( java data generation algorithm ))
Search alternatives:
- developing affective »
- generation algorithm »
- affective computing »
- computing algorithm »
- data generation »
- java »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
Get full text
Get full text
Thesis -
2
-
3
A random search based effective algorithm for pairwise test data generation
Published 2011“…This paper proposes an effective random search based pairwise test data generation algorithm named R2Way to optimize the number of test cases. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
5
EasyA: Easy and effective way to generate pairwise test data
Published 2013“…This paper proposes a matrix based calculation for pairwise test data generation algorithm named EasyA to optimize the number of test cases. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Café Web Based System Using Priority Scheduling Approach
Published 2017“…It can be tedious and messy, and can end up with data inconsistency for generating sales report. …”
Get full text
Get full text
Conference or Workshop Item -
7
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
8
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The second agent is a reliability evaluation agent that uses a recursive algorithm to predict the suitability generator based on the frequency and duration reliability indices in each state while the third agent is the storage and transfer of data between the other two agents. …”
Get full text
Get full text
Thesis -
9
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
10
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
12
Ant colony optimization algorithm for dynamic scheduling of jobs in computational grid
Published 2012“…In computational grid, job scheduling is one of the main factors affecting grid computing performance. …”
Get full text
Get full text
Monograph -
13
Development of heuristic task scheduling algorithm in cloud computing
Published 2016Get full text
Get full text
Proceeding Paper -
14
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
15
-
16
The shortest route of the potential companies for internship using Dijkstra’s Algorithm / Mohamad Khairul Ikhwan Mohd Radzi
Published 2017“…Technological development also affects the detection field. Today many methods invented by experts in technology to facilitate the public to make any finding on whether static or dynamic detection. …”
Get full text
Get full text
Thesis -
17
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
18
Comprehensive review of the development of the harmony search algorithm and its applications
Published 2019“…First, we describe the HS algorithm and present how its parameters affect algorithm performance. …”
Get full text
Get full text
Get full text
Article -
19
Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure
Published 2019“…As the amount of data generated is growing exponentially, harnessing such voluminous data has become a major challenge these years especially bibliographic data. …”
Get full text
Get full text
Get full text
Article -
20
Development of a phantom and metal artifact correction (MAC) algorithm for post-operative spine computed tomography (CT) imaging / Noor Diyana Osman
Published 2014“…The MAC algorithm was developed in MATLAB environment and was applied on virtual sinogram which directly computed through forward projection of CT images. …”
Get full text
Get full text
Thesis
