Search Results - (( developing special data algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    DESIGN AND DEVELOPMENT OF ANDROID-BASED LEARNING MEDIA FOR LEARNING ALGORITHM AND DATA STRUCTURE by Rosyid Ridlo, Al Hakim, Rianti Y., Kisworini, Aditia P., Hamid, Agung, Pangestu, Ariep, Jaenul, Yanuar Zulardiansyah, Arief

    Published 2021
    “…This study aims to design learning media algorithms and data structures based on Android. The research method uses a waterfall-type system development life cycle (SDLC). …”
    Get full text
    Get full text
    Get full text
    Proceeding
  2. 2

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A hybrid database encryption algorithm based on reverse string and dynamic key by Abduljabbar, Waleed Khalid, Mohd Jamil, Jastini, Mohd Shaharanee, Izwan Nizal, Ahmed, Waleed K., Ali, Azhar Tareq

    Published 2016
    “…Personal computers has become one of the important part of human life, especially when they using the Internet or any public networks.So, the information or data may still be deliberately or inadvertently leaked out by the insiders or customers.In this paper, we proposing new algorithm to protect any type of data, depending on the substitution techniques, using dynamic key (DK) and reveres string for each character in the text (or field in the file of the database) and each string .A special equation was developed to generate the DK, it’s depend on the length of string, order the character in the string,ASCII code of the character, and string sequence.The proposed algorithm using the reverse string before encryption, also, there are two actions after that, for the purpose of increasing the complexity of the algorithm.The results showed that The developed algorithm was successes to remove any duplicate encryption, for each character and each record even when the text duplicated.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Seed disperser ant algorithm for optimization / Chang Wen Liang by Chang , Wen Liang

    Published 2018
    “…The Seed Disperser Ant Algorithm (SDAA) is developed based on the evolution or expansion process of Seed Disperser Ant (Aphaenogaster senilis) colony. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    An estimation algorithm for improved maritime obstacle detection by Amir Alaqeb, Abdelrhman Mohamed, Rashid, Muhammad Mahbubur, Mohd Zaki, Hasan Firdaus, Embong, Abd Halim

    Published 2024
    “…A specialized ROS node facilitates data fusion by prioritizing ZED2I camera data, enhancing detection accuracy through comparisons with LiDAR data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Butterfly Triple System Algorithm Based on Graph Theory by Ibrahim, Haslinda, Aldiabat, Raja’i, Karim, Sharmila

    Published 2022
    “…In combinatorial design theory, clustering elements into a set of three elements is the heart of classifying data, which has recently received considerable attention in the fields of network algorithms, cryptography, design and analysis of algorithms, statistics, and Information theory. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Extraction of Inherent Frequency Components of Multiway EEG Data Using Two-Stage Neural Canonical Correlation Analysis by W Omar Ali Saifuddin, Wan Ismail, A. N. M. Enamul, Kabir

    Published 2014
    “…This paper presents an algorithm for extracting underlying frequency components of massive Electroencephalogram (EEG) data. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing by Elrasheed Ismail, Sultan

    Published 2013
    “…Then they are assigned to the machines according to the assignment algorithm for job combinations, which is a special integer partition algorithm. …”
    Get full text
    Thesis
  9. 9
  10. 10

    Iot health monitoring system for self quarantined covid-19 patients by Vikneswaran, Balakrishnan

    Published 2022
    “…This study focuses fully on the development of a system of monitoring the health data of Covid-19 patients who undergoing self-quarantine by means of data classification. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11
  12. 12

    Rule-based filtering algorithm for textual document by Jamil, Nurul Syafidah, Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2017
    “…Improper filtration might cause terms that have similar meaning to be removed.Thus, to reduce the high-dimensionality of text, this study proposed a filtering algorithm that is able to filter the important terms from the pre-processed text and applied term weighting scheme to solve synonym problem which will help the selection of relevant term.The proposed filtering algorithm utilizes a keyword library that contained special terms which is developed to ensure that important terms are not eliminated during filtration process.The performance of the proposed filtering algorithm is compared with rough set attribute reduction (RSAR) and information retrieval (IR) approaches.From the experiment, the proposed filtering algorithm has outperformed both RSAR and IR in terms of extracted relevant terms.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri by Md Nazri, Mohamad Nazir

    Published 2021
    “…This analysis is done to verify the algorithm of interpolation method and to find the best interpolation method for implement in the developed android application. …”
    Get full text
    Get full text
    Thesis
  15. 15

    An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar by Jaafar, Siti Aisyah

    Published 2021
    “…Therefore, in this research, the first objective is to develop an algorithm for a remote AR-IoT monitoring system. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik by Abdullah, Abdul Hanan

    Published 2003
    “…Hashing function implementation have been using in this system as its cryptography algorithm. In authorised data security on client and server research, researcher mainly focused on data intrusions that can occur anytime without users awareness. …”
    Get full text
    Get full text
    Monograph
  17. 17

    The Development of Color Based Visual Search Utility by Mohamed, Al Mabruk S.

    Published 2001
    “…Secondly, the color algorithm was developed to interpret natural expressions of content such as 10%, 20%, etc. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Framework development in extracting rules from trained neural network / Shuzlina Abdul Rahman, Azlinah Hj Mohamed and Marina Yusoff by Abdul Rahman, Shuzlina, Mohamed (Hj), Azlinah, Yusoff, Marina

    Published 2006
    “…The analysis is derived by excavating literature on RE techniques starting from the year 1993 until 2003 focused on supervised learning algorithm. The framework primarily demonstrates that each approach does not require a special training process for a new input dataset and does not require special network architecture and it can be used as a guideline to ANNs researcher and developer to choose a suitable RE techniques in order for them to perform ANNs' research or developing ANN applications.…”
    Get full text
    Get full text
    Research Reports
  19. 19
  20. 20

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item