Search Results - (( developing function new algorithm ) OR ( java information using algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis outlines the two different implementation techniques of the existing FLEX algorithm using java based parsers and using a query language for XML. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…These data are processed and stored in appropriate formats in a MySQL server database. Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Semiparametric inference procedure for the accelarated failure time model with interval-censored data by Karimi, Mostafa

    Published 2019
    “…The main contribution of this research is developing statistical approaches, and introducing new algorithms and resampling methods for analysing interval-censored data through AFT models.…”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Hybrid cryptography algorithm to improve security cloud storage by Abd Almohsen, Inam Razzaq

    Published 2017
    “…Utilization of a solitary algorithm is not powerful for extra ordinary state security to information in cloud computing. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Logic Programming In Radial Basis Function Neural Networks by Hamadneh, Nawaf

    Published 2013
    “…In this thesis also, I developed a new technique to extract the logic programming from radial basis function neural networks. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Text messaging encryption system by Sundara Morthty, Nirmala Devi

    Published 2012
    “…The programming language that is used to write the program is Java Language.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…Advanced Encryption Standard algorithm is being used to encrypt the text messaging. …”
    Get full text
    Get full text
    Student Project
  18. 18

    Computation of cryptosystem based on Lucas functions using addition chain by Md Ali, Zulkarnain, Othman, Mohamed, Md. Said, Mohamad Rushdan, Sulaiman, Md. Nasir

    Published 2010
    “…New technique shows a smaller computation time compared to the existing algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations by Mohd Ali, Fakariah Hani

    Published 2004
    “…The new approach algorithm speed increment has consistently increased in between 18% to 22% microsecond for encryption and 30% to 34% for decryption compared to Rijndael algorithm.…”
    Get full text
    Get full text
    Thesis
  20. 20

    New random approaches of modified adaptive bats sonar algorithm for reservoir operation optimization problems by Nor Shuhada, Ibrahim

    Published 2024
    “…Generally, the average results indicates that the newly developed algorithm retrieved better than original MABSA in finding a minimum point which increment 5.833% better than original MABSA, and new algorithm retrieved 5.204% more better than global optimum value. …”
    Get full text
    Get full text
    Thesis