Search Results - (( feature generation using algorithm ) OR ( java application using algorithm ))
Search alternatives:
- feature generation »
- generation using »
- java application »
- using algorithm »
-
1
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
Get full text
Get full text
Final Year Project -
2
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
4
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The project objectives includes:(i) To investigate lightweight message encryption algorithms by benchmarking their efficiency in terms of computation speed and generated cipher text size; (ii) To design and develop the TalkOut mobile application with lightweight message encryption by using prototype software development model.; and (iii) To evaluate the usability performance of the developed proposed TalkOut mobile application using System Usability Scale (SUS) approach. …”
Get full text
Get full text
Get full text
Academic Exercise -
5
Smart student timetable planner
Published 2025“…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
7
-
8
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
9
Identification of Freeform Depression Feature in a Part Using Vertex Attributes From Feature Volume / Pramod S Kataraki and Mohd Salman Abu Mansor
Published 2018“…The results obtained in .SAT file format show the algorithm generated feature volume, feature type and results obtained in .TXT file format show the quantitative values of features volume.…”
Get full text
Get full text
Article -
10
An integrated model of automated elementary programming feedback using assisted and recommendation approach
Published 2017“…Meanwhile, similar difficulty groups of the computer programs were generated using a K-Means clustering algorithm that was enhanced with ranking consideration. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
An ensemble data summarization approach based on feature transformation to learning relational data
Published 2015“…A ensemble clustering is designed, used and evaluated to generate the final classification framework that will take all input generated from the GA based clustering with Feature Selection and Feature Construction algorithms and perform the classification task for the relational datasets. …”
Get full text
Get full text
Get full text
Thesis -
12
Evaluation of data mining models for predicting concrete strength
Published 2024“…The Particle Swarm Optimization algorithm is able to generate optimal values for the concrete features that maximizes the strength of concrete. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Whale optimization algorithm based on tent chaotic map for feature selection in soft sensors
Published 2025“…One of the powerful optimization algorithms that is used for feature selection is the Whale Optimization Algorithm (WOA), which is a nature-inspired metaheuristic optimization algorithm that mimics the social behavior of humpback whales. …”
Get full text
Get full text
Get full text
Article -
14
Modelling complex features from histone modification signatures using genetic algorithm for the prediction of enhancer region
Published 2014“…Using Genetic Algorithm, this paper presents a modelling method to generate novel logical-based features from DNA sequences enriched with H3K4mel histone signatures. …”
Get full text
Get full text
Get full text
Article -
15
Facial features point localization using modified SIFT scale space / Zulfikri Paidi
Published 2020“…Surface change creates high-dimensional data during feature extraction work. There are many algorithms proposed for recognition of facial expressions, including SIFT algorithms that are considered superior in performing feature extraction. …”
Get full text
Get full text
Thesis -
16
Development Of Generative Computer-Aided Process Planning System For Lathe Machining
Published 2019“…This study attempts to solve this problem by recognizing the part model’s features via its geometrical based and produce sub-delta volumes that can later be used to generate manufacturing feature-based data for CAM in a single system via generations of algorithm through open source 3D CAD modeller. …”
Get full text
Get full text
Thesis -
17
DNA enhancer prediction using machine learning techniques with novel feature representation
Published 2016“…Technical contributions of this study are: 1) complex tree-feature modelling using genetic algorithm (CTreeGA): Automated feature generation framework to capture patterns of interactions among short DNA segments in histone sequences.…”
Get full text
Get full text
Get full text
Thesis -
18
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Mobile technology generations and cryptographic algorithms: analysis study
Published 2016“…This paper provides analysis study of Mobile generations (From Mobile 1G to Mobile 4G) and cryptographic algorithms used in these generations. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis
