Search Results - (( developing using mach algorithm ) OR ( java application means algorithm ))

Refine Results
  1. 1

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…The K-means algorithm has been around for over a century. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    CFD-based optimization of base pressure behavior on suddenly expanded flows at supersonic Mach numbers by Jaimon, Dennis Quadros, Khan, Sher Afghan, Prashanth, T.

    Published 2022
    “…: The base pressure developed in a suddenly expanded flow process majorly depends on Mach number (M), nozzle pressure ratio (NPR), area ratio (AR), and length to diameter ratio (L/D). …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
    Get full text
    Get full text
    Journal
  5. 5

    Prediction of base pressure in a suddenly expanded flow the processes at supersonic Mach Number Regimes using ANN and CFD by Quadros, Jaimon Dennis, Khan, Sher Afghan

    Published 2020
    “…The CFD numerical demonstrate was approved by an experimental test rig that developed results for base pressure and used a nozzle and sudden extended axisymmetric duct to do so. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Prediction of base pressure in a suddenly expanded flow process at supersonic mach number regimes using ANN and CFD by Quadros, Jaimon Dennis, Khan, Sher Afghan

    Published 2020
    “…The CFD numerical demonstrate was approved by an experimental test rig that developed results for base pressure, and used a nozzle and sudden extended axissymmetric duct to do so. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Biometrics electronic purse by Abdul Rahman, Abdul Wahab, Eng, Chong Tan, S., M. Heng

    Published 1999
    “…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Modeling and validation of base pressure for aerodynamic vehicles based on machine learning models by Quadros, Jaimon Dennis, Khan, Sher Afghan, Aabid, Abdul, Baig, Muneer

    Published 2023
    “…The data for training and testing the algorithms was derived using the regression equation developed using the Box-Behnken Design (BBD). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14

    Solution of Navier-Stokes equations by fourth-order compact schemes and AUSM flux splitting by Mawlood M.K., Basri S., Asrar W., Omar A.A., Mokhtar A.S., Ahmad M.M.H.M.

    Published 2023
    “…The developed method is then used to compute some example laminar flow problems. …”
    Article
  15. 15
  16. 16

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Base drag estimation in suddenly expanded supersonic flows using backpropagation genetic and recurrent neural networks by Jaimon, Dennis Quadros, Prashanth, T., Khan, Sher Afghan

    Published 2022
    “…That prompted the current work to develop input-output relationships for a suddenly expanded flow process using experiments and neural network-based forward and reverse mapping. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item