Search Results - (( developing using three algorithm ) OR ( java data integration algorithm ))
Search alternatives:
- integration algorithm »
- developing using »
- data integration »
- three algorithm »
- java »
-
1
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…The results also show that in Java, A Arraylist is the most suitable choice for storing Object and Arraylnt list is the most suitablec choice for storing integer data. …”
Get full text
Thesis -
3
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…The results also show that in Java, A Arraylist is the most suitable choice for storing Object and Arraylnt list is the most suitablec choice for storing integer data. …”
Get full text
Get full text
Thesis -
4
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…TensorFlow is utilized to integrate machine learning with an Android application. …”
Get full text
Get full text
Get full text
Article -
5
Smart student timetable planner
Published 2025“…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Nested repetitive structure techniques in examination seating number allocation process at UiTM Pulau Pinang branch / Jamal Othman, Rozita Kadar and Naemah Abdul Wahab
Published 2020“…To automate the process of assigning the seating numbers, an algorithm was designed and constructed using the nested repetitive or looping structure techniques with JAVA programming language. …”
Get full text
Get full text
Get full text
Article -
7
AI powered asthma prediction towards treatment formulation : An android app approach
Published 2022“…TensorFlow is utilized to integrate machine learning with an Android application. …”
Get full text
Get full text
Get full text
Article -
8
-
9
Stereolithography 3D printing development of 3D printing machine controller using the predefined closest-distance volume interpolator system
Published 2019“…Recent advancement in 3D printing technology has led to the development of projection mask stereolithography 3D printing process. …”
Get full text
Get full text
Research Report -
10
The Development Of A Robust Algorithm For Uav Path Planning In 3d Environment
Published 2016“…Thus, a new algorithm known as infection evolution (IE) was developed in this study. …”
Get full text
Get full text
Thesis -
11
Magnetic attitude control options for earth pointing small satellite
Published 2011“…The developed control algorithms are modeled using the MATLAB SIMULINK codes. …”
Get full text
Get full text
Thesis -
12
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…In addition, the mentioned block-matching algorithms are the baseline techniques that have been used to further develop all the enhanced or improved algorithms. …”
Get full text
Get full text
Get full text
Book Chapter -
13
Development of obstable avoidance system for 3D robot navigation
Published 2024“…In this project, an algorithm was developed to implement an obstacle avoidance system in 3D robot navigation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Path planning for unmanned aerial vehicles using visibility line-based methods
Published 2011“…In addition, a software package using Matlab for 2D and 3D path planning has also been developed. …”
Get full text
Get full text
Thesis -
15
Encrypted email using 3D AES block cipher algorithm / Khairah Mohd Wi
Published 2015“…Encrypted email is addition mail that comes up with prototype application called,3D-AES block cipher. There are three objective designed: To identify an encrypted email application development of 3D AES block cipher algorithm and hash process, to develop encrypted email using 3D AES process on email and lastly to measure the validity of the encrypted & decrypted email message by comparing the hash value generate before encrypt and after decrypt. …”
Get full text
Get full text
Thesis -
16
Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement
Published 2016“…Hence, this complicated structure and operation will affect the capability of SAPFs to work efficiently.Therefore, this work proposes three soft-computing algorithms for generating reference currents, and controlling current and voltage of a three-phase three-leg three-wire SAPF. …”
Get full text
Get full text
Thesis -
17
Mathematical models and optimization algorithms for low-carbon Location-Inventory-Routing Problem with uncertainty
Published 2024“…Given the NP-Hard nature of the three models proposed in this thesis, two metaheuristic algorithms have been developed. …”
Get full text
Get full text
Get full text
Thesis -
18
Flowshop scheduling using artificial bee colony (ABC) algorithm with varying onlooker bees approaches
Published 2015“…The research also analyzes the performance of the ABC algorithm using three different onlooker bee approaches. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
A modification of Shamir's Three-Pass protocol by implementing one-time pad algorithm / Nur Khairunnisa' Kusman, Nurul Hanis Abd Rashid and An Nur Ameera Zamani
Published 2019“…As a result, this study success to develop the algorithm by implemented one-time pad in Shamir's three-pass protocol. …”
Get full text
Get full text
Student Project -
20
Compressing Images Using Multi-Level Wavelet Transform Algorithm (MWTA)
Published 2012“…Multi-levels were used in this study with the aim to produce better results for compressing images.The Multi-level Wavelet Transform Algorithm (MWTA) consists of three phases namely, first level compression, second level compressing in the first level, and algorithm validation by compare.Therefore, Vaishnavi method is used to design and develop the prototype model.In this study, the experiment was conducted using different images (RGB). …”
Get full text
Get full text
Get full text
Thesis
