Search Results - (( effective implementation framework algorithm ) OR ( java application tools algorithm ))
Search alternatives:
- implementation framework »
- application tools »
- java application »
- tools algorithm »
-
1
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
2
-
3
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
4
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023“…The main objective of this paper is to propose and implement an intelligent framework documentation approach that integrates case-based learning (CBL) with genetic algorithm (GA) and Knuth-Morris-Pratt (KMP) pattern matching algorithm with the intention of making learning a framework more effective. …”
Conference paper -
5
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
6
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
7
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Initially, this tool adopts only Crow Search, Jaya, and Sine Cosine algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Low-level hybridization scripting language with dynamic parameterization in PSO-GA / Suraya Masrom
Published 2015“…Evaluations of four different sets of applications that used the proposed implementation frameworks with dynamic parameterization have indicated the effectiveness of each tested algorithm in comparison to the single PSO and constant parameterization. …”
Get full text
Get full text
Thesis -
9
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project is developed by using Rapid Application Development methodology as it is the model that is most suitable for developing this web tools. …”
Get full text
Get full text
Thesis -
10
-
11
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
13
Genetic algorithm based ensemble framework for sentiment analysis
Published 2018“…The objectives of this work include to investigate the effects of diversifying the feature selection methods on the sentiment analysis results and estimate suitable thresholds to apply, to investigate the effects of diversifying the feature extraction methods on the sentiment analysis results and lastly to implement and evaluate the performance of a multi-layer ensemble framework with optimization algorithm to produce accurate results. …”
Get full text
Get full text
Thesis -
14
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
15
Real-time anomaly detection using clustering in big data technologies / Riyaz Ahamed Ariyaluran Habeeb
Published 2019“…Furthermore, when implemented, this framework shall enable an organization to instantly detect anomaly in real-time while having potential for a more effective fault tolerance and scalability. …”
Get full text
Get full text
Get full text
Thesis -
16
A framework for implementing asynchronous replication scheme in utility-based computing environment
Published 2016“…Our experiments show that the proposed framework is capable to become a platform of an effective resource selection scheme and achieve a good result with good system performance as compared to existing algorithms.…”
Get full text
Get full text
Conference or Workshop Item -
17
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
18
NIS-Apriori-based rule generation with three-way decisions and its application system in SQL
Published 2020“…Subsequently, the implementation of the NIS-Apriori algorithm in SQL is described and a few new topics induced by effects of NIS-Apriori-based rule generation are confirmed. …”
Get full text
Get full text
Article -
19
A multilayered convolutional sparse coding framework for modeling of pooling operation of convolution neural networks
Published 2019“…However open problems like effect of pooling operations, batch normalization and dictionary learning in context of ML-CSC framework remain challenging issues especially in implementation scenarios. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
A technical framework analysis of digital twin control algorithms for HVAC-BMS Integration and implementation challenges for Malaysian green buildings
Published 2025“…Using PRISMA methodology, 36 articles published between 2020 - 2024 were systematically reviewed, analysing implementation frameworks, energy optimization strategies, and security considerations. …”
Get full text
Get full text
Get full text
Article
