Search Results - (( effective implementation function algorithm ) OR ( java information using algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis outlines the two different implementation techniques of the existing FLEX algorithm using java based parsers and using a query language for XML. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…These data are processed and stored in appropriate formats in a MySQL server database. Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Comparative implementation of the benchmark Dejong 5 function using flower pollination algorithm and the African buffalo optimization by Odili, Julius Beneoluchi, Noraziah, Ahmad

    Published 2019
    “…This communication presents experimental research findings on the application of the flower pollination algorithm (FPA) and the African buffalo optimization (ABO) to implement the complex and fairly popular benchmark Dejong 5 function. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…The recent trend of software development uses OO paradigm. Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Hybrid cryptography algorithm to improve security cloud storage by Abd Almohsen, Inam Razzaq

    Published 2017
    “…Utilization of a solitary algorithm is not powerful for extra ordinary state security to information in cloud computing. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    IMPLEMENTATION OF NOISE CANCELLATION WITH HARDWARE DESCRIPTION LANGUAGE by SUN, LEE KUANG

    Published 2006
    “…Finally the adaptive algorithm is added to the filter, and implemented in the FPGA. …”
    Get full text
    Get full text
    Final Year Project
  13. 13
  14. 14

    Design Methodology and Analysis of Hash Function based-on Field Programmable Gate Array for Hash-based Message Authentication Code Application by SHAMSIAH BINTI, SUHAILI

    Published 2025
    “…All these design methodologies aim to confirm the effect of HDL coding style on the performance of hardware algorithms implemented on FPGA. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Real time nonlinear filtered-x lms algorithm for active noise control by Sahib, Mouayad Abdulredha

    Published 2012
    “…However, unlike the other algorithms, NLFXLMS cannot be implemented in real time. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Enhancing speed performance of the cryptographic algorithm based on the lucas sequence by M. Abulkhirat, Esam

    Published 2003
    “…The deployment of network security procedures requires the implementation of cryptographic functions. More specifically, these include encryption, decryption, authentication, digital signature algorithms and message-digest functions. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Text messaging encryption system by Sundara Morthty, Nirmala Devi

    Published 2012
    “…The programming language that is used to write the program is Java Language.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…Advanced Encryption Standard algorithm is being used to encrypt the text messaging. …”
    Get full text
    Get full text
    Student Project
  19. 19
  20. 20