Search Results - (( development using data algorithm ) OR ( java implementation some algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  3. 3

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    Implementation of RIO in UMJaNetSim / Chan Chin We by Chan, Chin We

    Published 2004
    “…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…In excel, a graph has been produced to show the minimum and maximum values of the new dynamic quantum time after setting the parameters of the proposed formula (priority, burst time and the current quantum time). The proposed algorithms (Priority Dynamic Quantum Time and Multi Priority Dynamic Quantum Time Algorithms) are implemented using JAVA programming language and validated using Key Performance Indicators equations. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Implementation of New Improved Round Robin (NIRR) CPU scheduling algorithm using discrete event simulation by Chang, Jan Voon

    Published 2015
    “…Round Robin scheduling algorithm is the most widely used scheduling algorithm because of its simplicity and fairness. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Automated path testing using the negative selection algorithm by Shayma Mustafa Mohi-Aldeen, Radziah Mohamad, Safaai Deris

    Published 2017
    “…Negative selection algorithm (NSA) has been used in this paper to generate test data for path testing automatically. …”
    Get full text
    Get full text
    Indexed Article
  15. 15
  16. 16

    AGENT MEETING SCHEDULER by ZAINAL ABIDIN, NURAINI

    Published 2011
    “…Qualitative research method is being used to gather necessary data on agent algorithm and this data will be used to select the suitable algorithm. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    ANALYSIS AND INTERPRETATION OF PRESSURE TRANSIENT TEST DATA BY RECENT ROBUST DECONVOLUTION METHODS by Mohd Mustafa, Muhammad Izzatullah

    Published 2013
    “…Several synthetic and field test data are used to illustrate the effects of the algorithmic parameters on the deconvolved responses as well as the importance of the deconvolution in analysis and interpretation of pressure transient data.…”
    Get full text
    Get full text
    Final Year Project
  18. 18

    Boyer-Moore horspool algorithm used in content management system of data fast searching by Chan, Chung Hoong, M. A., Ameedeen

    Published 2017
    “…After a deep view on few fast searching algorithm as Boyer-Moore algorithm, Boyer-Moore Horspool algorithm, Brute-Force Algorithm, Knuth-Morris-Pratt algorithm and Rabin-Karp algorithm, this research paper chooses Boyer-Moore Horspool algorithm to used in the content management system in term of data Fast Searching. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Development of an algorithm for correlation of aircraft positioning data from radar and ADS-B sensors / Koh Che Hun by Koh , Che Hun

    Published 2019
    “…Based on the findings, a multi-sensor data correlation algorithm is developed. The algorithm is validated using real time radar and ADS-B data from Department of Civil Aviation Malaysia (CAAM). …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Sentiment analysis using clonal selection algorithm for Twitter’s data / Fatimah Mamat by Mamat, Fatimah

    Published 2012
    “…Clonal selection algorithm was used in this project because there are no researcher are focus on that technique for classify twitter’s data. …”
    Get full text
    Get full text
    Thesis