Search Results - (( integer implementation extraction algorithm ) OR ( java implementation tree algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    ZOT -Mk: A New Algorithm For Big Integer Multiplication by Jahani, Shahram

    Published 2009
    “…Since the multiplication on integers is not native to the computer architecture numbering structure of bits and bytes, such algorithms are bound to be a bit slower on the implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…The Hybrid Cube Encryption Algorithm (HiSea) has been implemented to validate the encryption keys that are generated from the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Key generation technique based on triangular coordinate extraction for hybrid cubes by Mushtaq, Muhammad Faheem, Jamel, Sapiee, Mohamad, Kamaruddin Malik, Ahmad Khalid, Shamsul Kamal, Mat Deris, Mustafa

    Published 2017
    “…In this study, we extend the hybrid cube encryption algorithm (HiSea) and our earlier Triangular Coordinate Extraction (TCE) technique for HC by increasing the complexity in the mathematical approaches. …”
    Get full text
    Get full text
    Article
  6. 6

    Reverse logistics network optimizing by genetic algorithm: a case study of automotive wiring harnesses by Sadrnia, Abdolhossein, Ismail, Napsiah, Mohd Ariffin, Mohd Khairol Anuar, Zulkifli, Norzima, Boyer, Omid

    Published 2014
    “…Thus, an evolutionary algorithm based genetic algorithm (GA) is applied as a solution methodology to solve mixed integer linear programming model and find the optimum solution. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Randomized pixel selection for enhancing LSB algorithm security against brute-force attack by Mohamad Afendee, Mohamed, Ammar, Y. Tuama, Mohamad, A. Mohamed, Abdullah, Muhammed, Zurina, M. Hanapi

    Published 2017
    “…One of the most effortless and widely-used techniques is the age-old Least Significant Bits (LSB) algorithm, which can be implemented in both transformative and spatial domains. …”
    Get full text
    Get full text
    Article
  8. 8

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
    Get full text
    Get full text
    Thesis
  9. 9