Search Results - (( developing block system algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    A new 128-bit block cipher by Mohd Ali, Fakariah Hani

    Published 2009
    “…Even though there have been so much development of the block cipher, the industry still requires another block cipher as long as security features are met. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Maze Mouse by Abdul Rahim, Asmalilah

    Published 2004
    “…The first block is the sensory systems which generate the input to the microcontroller systems. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Development of DNA-based dynamic key-dependent block cipher by Saeed, Auday H.

    Published 2015
    “…The symmetric block cipher is one of the most significant cryptographic algorithms. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security by Shamsudin, Ahmad Faizul, Suhaimi, Mohd Adam, Makarin, Rusydi Hasan, Jaafar, Abi Dzar

    Published 2010
    “…The Al-Muqattaat UCE was patent filed in 2007. A block cipher is required as a medium to translate the non - parametric Al-Muqatta’at algorithm into a suite so that it can be an embedded system for FPGA chips. …”
    Get full text
    Get full text
    Proceeding Paper
  11. 11
  12. 12

    Direct Integration Block Method for Solving Higher Order Ordinary Differential Equations by Azmi, Nurul Asyikin

    Published 2010
    “…In this thesis, the implicit block methods presented as in the simple form of Adams Moulton method are developed for solving higher order systems of Ordinary Differential Equations (ODEs). …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Parallel block backward differentiation formulas for solving ordinary differential equations. by Othman, Khairil Iskandar, Ibrahim, Zarina Bibi, Suleiman, Mohamed

    Published 2008
    “…A parallel block method based on Backward Differentiation Formulas (BDF) is developed for the parallel solution of stiff Ordinary Differential Equations (ODEs). …”
    Get full text
    Article
  15. 15

    Secure block cipher inspired by the human immune system by Ariffin, Suriyani

    Published 2012
    “…In computer security service, cryptographic algorithm is used to ensure adequate security of the systems or of data transfers. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Parallel direct integration variable step block method for solving large system of higher order ordinary differential equations. by Abdul Majid, Zanariah, Suleiman, Mohamed

    Published 2009
    “…The performance of the developed two point block method designed for two processsors for solving directly non stiff large systems of higher order ordinary differentiall equations (ODEs) has been investigated. …”
    Get full text
    Get full text
    Article
  19. 19

    Development of Finite Element Code for Non-Linear Analysis of Interlocking Mortarless Masonry System by Ahmed Al- Wathaf, Ahmed Hasan

    Published 2006
    “…An incremental-iterative 2-D nonlinear finite element code is developed to implement the proposed algorithm and analyze the masonry system till failure. …”
    Get full text
    Get full text
    Thesis
  20. 20