Search Results - (( development information selection algorithm ) OR ( java data function algorithm ))

Refine Results
  1. 1

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms by Teoh, Chin Chuang

    Published 2005
    “…In addition, the best band selected for image classification is not necessarily the best for classification.A Best Band Selection Index (BBSI) algorithm was developed which is capable of selecting the best band combination for image visualization and supervised classification. …”
    Get full text
    Get full text
    Thesis
  5. 5

    ABC: android botnet classification using feature selection and classification algorithms by Abdullah, Zubaile, Mohd Saudi, Madihah, Anuar, Nor Badrul

    Published 2017
    “…In this paper, a new approach for Android botnet classification based on features selection and classification algorithms is proposed. …”
    Get full text
    Get full text
    Article
  6. 6

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In order to develop an intelligent agent, various programming techniques are used in achieving the property of self learning, information retrieval and searching algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9

    Information Theoretic-based Feature Selection for Machine Learning by Muhammad Aliyu, Sulaiman

    Published 2018
    “…Thus, this thesis has developed and evaluated a filter based Information Theoretic-based Feature Selection (IFS) for machine learning. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Multiview Laplacian semisupervised feature selection by leveraging shared knowledge among multiple tasks by Krishnasamy, Ganesh, Paramesran, Raveendran

    Published 2019
    “…Experiment results on several multimedia applications have shown that the proposed algorithm is competitive compared with the other single-view feature selection algorithms.…”
    Get full text
    Get full text
    Article
  11. 11

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Semi-supervised learning for feature selection and classification of data / Ganesh Krishnasamy by Ganesh , Krishnasamy

    Published 2019
    “…Recently, considerable advancement has been achieved in semi-supervised multi-task feature selection algorithms, where they have exploited the shared information from multiple related tasks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Gene Selection For Cancer Classification Based On Xgboost Classifier by Teo, Voon Chuan

    Published 2022
    “…Gene selection is the technique that applied to the gene selection dataset, such as DNA microarray, which is develop to reduce the less informative gene, so that the selected gene is related to the disease diagnosis. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17
  18. 18
  19. 19

    Adaptive Noise Cancellation Systems using Selectable Algorithm by Roshahliza, M. Ramli, Salina, Abdul Samad

    Published 2016
    “…Selectable algorithms for adaptive noise cancellation systems are promoted in this book. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book
  20. 20

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article