Search Results - (( filing implementation phase algorithm ) OR ( java visualization using algorithm ))
Search alternatives:
- filing implementation »
- implementation phase »
- java visualization »
- phase algorithm »
- using algorithm »
-
1
Sentiment Analysis of Airline Reviews Using Naive Bayes Algorithm / Ahmad Firdaus Maliki
Published 2021“…The overview for the methodology is divided into three phases which are preliminary phase, design and implementation phase and evaluation phase. …”
Get full text
Get full text
Thesis -
2
A performance analysis of association rule mining algorithms
Published 2016“…In this paper, we evaluate the performance of association rule mining algorithms in-terms of execution times and memory usage using the CPU profiler of Java VisualVM. …”
Get full text
Get full text
Conference or Workshop Item -
3
An enhanced Blowfish Algorithm based on cylindrical coordinate system and dynamic permutation box
Published 2014“…The research involved three phases, algorithm design, implementation, and evaluation. …”
Get full text
Get full text
Get full text
Thesis -
4
E-Raser: file shredder application with content replacement by using random words function
Published 2018“…The implemented algorithm replaced the original content of the files with uninformative words provided by the application. …”
Get full text
Get full text
Get full text
Article -
5
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
6
Development of durian ontology from unstructured text and external knowledge source / Khairul Nurmazianna Ismail
Published 2014“…While in the second phase, the HTML files are uploaded for processing. …”
Get full text
Get full text
Thesis -
7
Visdom: Smart guide robot for visually impaired people
Published 2025“…An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Experimental implementation controlled SPWM inverter based harmony search algorithm
Published 2017“…The proposed overall inverter design and the control algorithm are modelled using MATLAB environment (Simulink/m-file Code). …”
Get full text
Get full text
Get full text
Article -
9
Dynamic simulation of switched-reluctance motor using MATLAB/SIMULINK / Roslan Bakar
Published 2003“…The performance of a two-phase 4/6 pole SR motor is investigated. The simulation results for a simple current control considered to be reasonable but further work is required to implement control algorithm for accurate speed and torque control.…”
Get full text
Get full text
Thesis -
10
CleverSecure ONLINE System
Published 2008“…CleverSecure Online System (COS) implements on the use of popular algorithm which is Blowfish algorithm to encrypt and decrypt the data that can be save in directory or send through email. …”
Get full text
Get full text
Final Year Project -
11
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…D3.js is used as a technology to visualize the result in interactive form or dynamic visualization which is a JavaScript library and Python is a language to program the system. …”
Get full text
Get full text
Thesis -
12
Web usage mining for UUM learning care using association rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Thesis -
13
Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure
Published 2019“…This study proposing an enhance bibliographic data retrieval and visualization using hybrid clustering method consists of K-harmonic mean (KHM) and Spectral Algorithm and eigenvector centrality measure. …”
Get full text
Get full text
Get full text
Article -
14
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
Get full text
Get full text
Thesis -
15
Experimental implementation controlled SPWM inverter based harmony search algorithm
Published 2023Article -
16
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Algorithms are developed for a simulated mobile robot that uses an array of range finders for navigation. …”
Get full text
Get full text
Monograph -
17
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
19
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Get full text
Thesis -
20
Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security
Published 2010“…In an envisaged pre-commercialization phase, the UCE block cipher would be implemented in FPGA chips. …”
Get full text
Get full text
Proceeding Paper
