Search Results - (( development authority function algorithm ) OR ( java _ normalization algorithm ))

Refine Results
  1. 1

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Improving resource management with multi-instance broker scheduling algorithm in hierarchical grid computing by Yahaya, Bakri

    Published 2016
    “…The designed modules is in the form of algorithms, GridSim, Java Development Kits and Java Language used to support the design process whereas the Netbeans software serves as the platform to simulate the experiment so as to obtain the results. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S.

    Published 2024
    “…Through analysing the functional requirements of the system in the project, using MySQL database and Enhancer platform, the intelligent fault diagnosis management system of cloud computing power plant is designed and developed, which realises the functions of system modules such as system authority management, electronic equipment account, technical supervision, expert database, data centre. …”
    Article
  5. 5
  6. 6

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    A new text-based w-distance metric to find the perfect match between words by Ali, M., Jung, L.T., Hosam, O., Wagan, A.A., Shah, R.A., Khayyat, M.

    Published 2020
    “…The core engine of the k-NN algorithm is the distance/similarity function. The performance of the k-NN algorithm varies with the selection of distance function. …”
    Get full text
    Get full text
    Article
  9. 9

    Reliability fuzzy clustering algorithm for wellness of elderly people by N. J., Mohd Jamal, Ku Muhammad Naim, Ku Khalif, Mohd Sham, Mohamad

    Published 2019
    “…This proposed algorithm could support to improve the overall health of CKD patients through a variety of indicators such as physical functioning, mental health, vitality, and social functioning. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Collaboration algorithms between intermediaries for supporting flexible supply chain management by Mohd Tamrin, Mohd Izzuddin, Tengku Sembok, Tengku Mohd, Kartiwi, Mira

    Published 2013
    “…This is to facilitate process restructuring by adding or dropping the required services into the global execution schedule. The authors had develop the prototype of the IIMA and evaluate it with three other related systems in a simulated environment. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Blind signature / Musfirah Mohd Ali by Musfirah, Mohd Ali

    Published 2005
    “…In chapter 4 of this project explained the system requirements which are functional and nonfunctional requirements. This chapter also enlightened what kind of scheme that the author chose for this system. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Pseudo Randomized Search Strategy (PRSS*) of the ambiguity function mapping by Hassan, Azmi

    Published 1998
    “…A combination between three methods of optimization, global random search and ambiguity function mapping produced an efficient search algorithm what the author called the Pseudo Randomized Search Strategy (PRSS). …”
    Get full text
    Get full text
    Article
  16. 16

    Chaotic Immune Symbiotic Organisms Search algorithm for solving optimisation problem by Zamani M.K.M., Musirin I., Suliman S.I., Mustaffa S.A.S.

    Published 2023
    “…The performance of the proposed algorithm has been tested by solving several benchmark test functions. …”
    Article
  17. 17
  18. 18
  19. 19

    Agreement options for negotiation on material location decision of housing development by Utomo, C., Rahmawati, Y.

    Published 2020
    “…It will need the development of trade-off algorithms to analyze value of technical solution in real time. …”
    Get full text
    Get full text
    Article
  20. 20

    MOBILE ROBOT by ABU KASSIM, ABU MASNUR

    Published 2004
    “…These are to be achieved by Voronoi Diagram or Delaunay Triangulation method for mapping, and a combination of one or more of the Dijkstra, Bellman, Ford, Moore, Johnson, Floyd-Warshal, or A* algorithms for best path calculation. In some parts of the project especially the intelligent navigation algorithms, the author encountered many new ideas and theories which the author cannot fully understand. …”
    Get full text
    Get full text
    Final Year Project