Search Results - (( developing post integration algorithm ) OR ( java data function algorithm ))
Search alternatives:
- integration algorithm »
- function algorithm »
- post integration »
- developing post »
- data function »
- java »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
A collaborative model for post flood activities exploiting an enhanced expanding neighborhood search algorithm
Published 2019“…The aim of this model is to extend the proximity service (ProSe) and expand integrated global-local information exchange in the post-flood SAR activities. …”
Get full text
Get full text
Thesis -
4
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
5
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
6
Integrating of web 2.0 technologies for interactive courseware : data structure and algorithm as case study
Published 2013“…Besides that, the research also aims to develop a prototype for Interactive Courseware using Web 2.0 by integrating Web 2.0 technologies and services and lastly to evaluate the effectiveness and the usability of the project by comparing the pre-test and post-test result and surnmative evaluation respectively. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
7
Algorithmic fairness in AI-driven project management for post-conflict and developing regions: a critical review and framework for context-aware AI
Published 2026“…However, deploying AI uncritically in the data-poor and socially fragile environments of post-conflict and developing regions creates profound ethical risks. …”
Get full text
Get full text
Get full text
Article -
8
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
9
Enhancing pineapple cultivar classification: a framework for image quality, feature extraction, and algorithmic refinement
Published 2025“…The proposed algorithmic refinements integrate chromatic and morphological attributes, particularly surface area and optimise logical operators to enhance accuracy. …”
Get full text
Get full text
Get full text
Article -
10
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
11
Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension
Published 2015“…Taking into account from those main issues, this study introduces the new model of integrated algorithm-program visualization (ALPROV) for developing program comprehension tool. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Document ranking using information quality criteria in weblog search engine
Published 2013“…A ranking method is developed for the Weblog search engine where the post is considered as the document retrieved. …”
Get full text
Get full text
Thesis -
13
The Effectiveness Of Steam Integrated Approach Using Scratch Module On Achievement And Computational Thinking In Learning Electricity Concepts
Published 2022“…In this research, a quasi-experimental design was employed with pre-test, post-test and delayed post-test of Electricity Achievement Test (EAT) and Computational Thinking Survey (CTS) to collect the quantitative data. …”
Get full text
Get full text
Thesis -
14
The implementation of post-processing data thinning for multibeam echo sounding data
Published 2006“…Comparisons on the final results based on these three algorithms will be discussed in order to decide which algorithm is most favorable to be used in post-processing data thinning for cleaned MBES dataset. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
SPY-BOT: Machine learning-enabled post filtering for social network-integrated industrial internet of things
Published 2021“…To address those challenges by detecting hazardous contents and create a stable social internet environment within IIoT, a statistical learning-enabled trustworthy analytic tool for human behaviors has been developed in this paper. More specifically, this paper proposes a machine learning (ML)-enabled scheme SPY-BOT, which incorporates a hybrid data extraction algorithm to perform post-filtering that arbitrates the users’ behavior polarity. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
SPY-BOT: Machine learning-enabled post filtering for social network-integrated industrial internet of things
Published 2021“…To address those challenges by detecting hazardous contents and create a stable social internet environment within IIoT, a statistical learning-enabled trustworthy analytic tool for human behaviors has been developed in this paper. More specifically, this paper proposes a machine learning (ML)-enabled scheme SPY-BOT, which incorporates a hybrid data extraction algorithm to perform post-filtering that arbitrates the users’ behavior polarity. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Efficient multi-UAV coordination via rl: joint path planning and task scheduling for post-disaster UAV-assisted MEC systems
Published 2025“…These findings highlight GRLA's robustness and efficiency, validating it as a practical solution for real-world post-disaster UAV coordination. The key contribution of this paper is the development of the GRLA framework, which unifies path planning and task scheduling in UAV-assisted MEC systems under dynamic post-disaster conditions.…”
Get full text
Get full text
Get full text
Get full text
Article -
18
Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y...
Published 2017“…The current paper presented the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) for the purpose of self-decision method in selecting IMF with the correct IMF selecting criterion. …”
Get full text
Get full text
Article -
19
Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz)
Published 2017“…The current paper presented the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) for the purpose of self-decision method in selecting IMF with the correct IMF selecting criterion. …”
Get full text
Get full text
Get full text
Article -
20
Quantifying and assessing post-stroke patients' functional capability level for independent daily activities: a review
Published 2025“…It delves into the existing standards of clinical assessment, explores the integration of sensors in limb rehabilitation prototypes, and observes the mathematical methods and algorithms employed by previous researchers to assess and quantify stroke patients' functional capability automatically. …”
Get full text
Get full text
Get full text
Get full text
Article
