Search Results - (( developing function means algorithm ) OR ( java generation process algorithm ))

Refine Results
  1. 1

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Café Web Based System Using Priority Scheduling Approach by Fatimah, Ghazali, Rohana, Ismail, Mohamad Hariz, Hasni

    Published 2017
    “…The priority scheduling algorithm is based on Control Processing Unit scheduling algorithm where it has a priority to execute tasks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…Fuzzy modeling is a process of generating parameters which are fuzzy rule and membership function. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…To reduce the test cases generated during testing process, combinatorial algorithms which consisting Hill Climbing algorithm and T Way Combination algorithm as described in twayGenerator (Kamal Zuhairi Zamli, 2007) have been studied and reviewed. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…Results: Attack on the key generation process was prevented because of random key generation and its dependency to input message. …”
    Get full text
    Get full text
    Article
  9. 9

    Java based expert system for selection of natural fibre composite materials by Ahmed Ali, Basheer A., Salit, Mohd Sapuan, Zainudin, Edi Syams, Othman, Mohamed

    Published 2013
    “…Many research papers are published in the field of materials selection for manufacturing process and design of polymer composite materials. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The website tested by many users that use to register and upload them own data and files using them own e-mails and the unique key that generated after completing the registration. We used to insure for the users data and files in our website by checking the process of our generated system (SCDS) and we got match results for the same files in case of encryption and decryption process.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    A soft hierarchical algorithm for the clustering of multiple bioactive chemical compounds by Salim, Naomie, Shah, J. Z.

    Published 2007
    “…The results of the algorithm show significant improvement in comparison to a similar implementation of the hard c-means algorithm.…”
    Get full text
    Get full text
    Get full text
    Book Section
  15. 15

    Performance comparison of THF-NLFXLMS and VFXLMS algorithms for Hammerstein NANC by Srazhidinov, Radik, Raja Ahmad, Raja Mohd Kamil

    Published 2016
    “…Despite similar performance, this algorithm is more advantageous than the Nonlinear Filtered-X Least Mean Square (NLFXLMS) due to the use of tangential hyperbolic function (THF) instead of scaled error function (SEF) which allows the degree of nonlinearity to be modeled. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption by Nurnajmin Qasrina Ann, Ayop Azmi

    Published 2023
    “…The research starts with developing the hybrid deep learning model consisting of DNN and a K-Means Clustering Algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…The weighted-range method (WRM) was introduced to identify the range value and to scrutinize the candidate materials in the selection process. The expert system performance was tested with automotive component as a case study with high,medium and low precision criteria and the result sets generated by the expert system comply with industry benchmarks. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Efficient genetic partitioning-around-medoid algorithm for clustering by Garib, Sarmad Makki Mohammed

    Published 2019
    “…These algorithms mostly built upon the partitioning k-means clustering algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Logic Programming In Radial Basis Function Neural Networks by Hamadneh, Nawaf

    Published 2013
    “…In this thesis also, I developed a new technique to extract the logic programming from radial basis function neural networks. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. Features selection process can be considered a problem of global combinatorial optimization in machine learning. …”
    Get full text
    Get full text
    Thesis