Search Results - (( developing formative function algorithm ) OR ( java information access algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Hybrid cryptography algorithm to improve security cloud storage by Abd Almohsen, Inam Razzaq

    Published 2017
    “…Utilization of a solitary algorithm is not powerful for extra ordinary state security to information in cloud computing. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…Therefore, SANAsms system ensures that information (SMS) interchange between sender and receiver is secured and protected because the messages containing delicate information are stored securely and remain undisclosed even when the device is accessed by an adversary. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Improvement and application of particle swarm optimization algorithm by Deevi, Durga Praveen, Kodadi, Sharadha, Allur, Naga Sushma, Dondapati, Koteswararao, Chetlapalli, Himabindu, Perumal, Thinagaran

    Published 2025
    “…When severe actuator faults impede certain robots, functioning wheeled mobile robots (WMRs) adjust their formation to reduce the consequences of the malfunction. …”
    Get full text
    Get full text
    Article
  5. 5

    Development of a mathematical model for the prediction of chip formation instability and its verification by fuzzy logic with genetic algorithm by Ullah Patwari, Mohammed Anayet, Amin, A. K. M. Nurul, Istihyaq , M.H., Faris, Waleed Fekry

    Published 2010
    “…In this paper, a new analytical technique is proposed to predict the frequency of chip formation instability as a function of cutting parameters. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Agreement options for negotiation on material location decision of housing development by Utomo, C., Rahmawati, Y.

    Published 2020
    “…Decision algorithms are based on the cooperative game theory to develop the agreement options and coalition formation. …”
    Get full text
    Get full text
    Article
  8. 8

    Inter-cell and intra-cell facility layout models under different demand environments in cellular manufacturing systems by Ariafar, Shahram

    Published 2012
    “…Moreover, the computation time (CPU Time) of the developed SA algorithm is significantly less than the benchmarked algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Modem Recognition Algorithm for Software Defined Radio Base Station by Rukumangatha Rajah, Sivaraman

    Published 2004
    “…Modem is the heart of a SDR system; it functions as an incoming modulation recogniser, multi-format demodulator, outgoing modulation recogniser, and multi-format modulator. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Multi-Object Attitude and Rate Tracking for Spacecraft in Formation Flying by Mohammad Abdelrahman, Mohammad Ibraheem

    Published 2011
    “…Based on the same approach the relative dynamics and kinematics are augmented to the previous system to represent the overall system process model. The developed controller is applied to spacecraft in formation as a decentralized control algorithm which aims to track absolute and relative attitude and rates simultaneously.The developed controller is applied to a spacecraft formation in a remote sensing mission.The simulations results show the capabilities of the MSDRE to handle the multi-object tracking without any unnecessary control efforts that might lead to actuators saturations or additional control logic to switch between absolute and relative tracking. …”
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Development Of Generative Computer-Aided Process Planning System For Lathe Machining by Zubair, Ahmad Faiz

    Published 2019
    “…To validate the generated tool-path, G-codes generated in media package file (MPF) file format and verified through CNC lathe machine. Indeed, the developed algorithm was able to determine the minimum unit production cost of lathe machining part model. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Normalized Relational Storage for Extensible Markup Language (XML) Schema by Kamsuriah, Ahmad, Reduan, Samad

    Published 2011
    “…The algorithm is based on computing a set of minimum covers for all functional dependencies on a universal relation when given XML Functional Dependencies (XFDs) and the schema information. …”
    Get full text
    Get full text
    Journal
  15. 15

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  16. 16

    E-Raser: file shredder application with content replacement by using random words function by Mohd Nahar, Nur Farah Aqilah, Ab Rahman, Nurul Hidayah, Mohammad, Kamarudin Malik

    Published 2018
    “…Thus, this study proposed a file shredding application named E-Raser which replacing the content of the file using random words function algorithm. A file shredder application named E-Raser was developed to shred Microsoft Word documents with (.doc) or (.docx) format. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Graph-Based Algorithm With Self-Weighted And Adaptive Neighbours Learning For Multi-View Clustering by He, Yanfang

    Published 2024
    “…To address the noise problem in multi-view data, this study enhances the gbs method and develops a new self-weighted graph multi-view clustering algorithm (swmcan). …”
    Get full text
    Get full text
    Thesis
  18. 18

    Songs Search Using Human Humming Voice by Abdul Rahman, Mohamad Ariff

    Published 2007
    “…The scopes for this project are human humming voice, voice capture in WA V format, songs database, and MIDI file comparing algorithm. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul by Tom´As, Maul

    Published 2006
    “…Following this, at the formational level, various local mechanisms are investigated in the context of the biological development of the proposed neural architectures. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Tacit knowledge for business intelligence framework using cognitive-based approach by Surbakti, Herison

    Published 2022
    “…Capturing the tacit knowledge is not a straightforward task, since it consists of unstructured data and related to a variety of information that is not always accessible through traditional means. …”
    Get full text
    Get full text
    Thesis