Search Results - (( development life implementation algorithm ) OR ( java data function algorithm ))
Search alternatives:
- implementation algorithm »
- life implementation »
- function algorithm »
- development life »
- data function »
- java »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Interactive jigsaw puzzle using backtracking algorithm / Amizah Mohd Kamaruzaman
Published 2012“…This project followed the System Development Life Cycle (SDLC) model for the developing of the system. …”
Get full text
Get full text
Thesis -
3
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
5
An Integrated Approach For Fatigue Life Estimation Based On Continuum Mechanics Theory And Genetic Algorithm
Published 2015“…This study focuses on an attempt to develop a new fatigue life estimation model using the concepts of continuum mechanics with a critical plane based approach. …”
Get full text
Get full text
Get full text
Article -
6
Letter recognition using backpropagation algorithm
Published 2010“…The expected output will be compared with the actual output. Software Development Life Cycle (SDLC) methodology will be used in this project development to make sure all the development process is running smoothly.…”
Get full text
Get full text
Undergraduates Project Papers -
7
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
8
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
9
Mobile machine vision for railway surveillance system using deep learning algorithm
Published 2021“…In this paper, object detection model is developed and implemented with deep learning algorithm. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
10
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…The computation intensive modular multiplication operation is based on the Montgomery’s algorithm and implemented using systolic array architecture. …”
Get full text
Get full text
Thesis -
11
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
12
Provider independent cryptographic tools
Published 2003“…The library is developed using Software Development Life Cycle (SDLC), supported by Unified Modeling Language (UML) for the design. …”
Get full text
Get full text
Get full text
Monograph -
13
Lithium-Ion Battery Charge Equalization Algorithm for Electric Vehicle Applications
Published 2023Article -
14
An implementation of Geographic Information System (GIS) for online classroom reservation (GISClaR) / Ahmad Subhi Zolkafly
Published 2013“…In order to solve these problems, an implementation of Geographic Information System (GIS) for online classroom reservation had been developed. …”
Get full text
Get full text
Thesis -
15
Jogging activity recognition using k-NN algorithm
Published 2022“…The k-NN algorithm is a simple and easy-to-implement supervised machine learning algorithm that can be used to solve both classification and regression problems. …”
Get full text
Get full text
Get full text
Academic Exercise -
16
An experimental study of neighbourhood based metaheuristic algorithms for test case generation satisfying the modified condition / decision coverage criterion
Published 2018“…We have chosen four neighborhood based algorithms which are commonly used in optimization problems and divided them in newly implemented and re-implemented category. …”
Get full text
Get full text
Thesis -
17
Smart student timetable planner
Published 2025“…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Design of a low-power microcontroller-based wireless ECG monitoring system
Published 2007“…A novel algorithm has been developed to detect life threatening events before transmission of signals to the nearby computer. …”
Get full text
Conference or Workshop Item -
19
Pharmacy stock inventory system
Published 2005“…Testing is done every phase of the development life cycle to make sure that the system working properly. …”
Get full text
Get full text
Undergraduates Project Papers -
20
The effects of compiler optimizations in face recognition system
Published 2009Get full text
Article
