Search Results - (( java application design algorithm ) OR ( based constructing system algorithm ))
Search alternatives:
- constructing system »
- application design »
- based constructing »
- java application »
- design algorithm »
- system algorithm »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…The study on related work and comparison of algorithm also has been done in this phase. In Design phase, the use case diagram, whole system flowchart and subsystem flowchart has been constructed to assist the development of this web tool. …”
Get full text
Get full text
Thesis -
2
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…This study focuses on design and development of a software based multi-floor indoor location estimation system using Wireless Local Area Network (WLAN). …”
Get full text
Get full text
Thesis -
3
Design and development of an intuitive desktop application for rapid SARS-CoV-2 diagnosis using electrochemical potentiostat
Published 2023“…We successfully constructed the application by leveraging the robust Electron framework and employing HTML, CSS, and JavaScript languages. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
5
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
6
Ant system-based feature set partitioning algorithm for classifier ensemble construction
Published 2016“…In this study, Ant system-based feature set partitioning algorithm for classifier ensemble construction is proposed.The Ant System Algorithm is used to form an optimal feature set partition of the original training set which represents the number of classifiers.Experiments were carried out to construct several homogeneous classifier ensembles using nearest mean classifier, naive Bayes classifier, k-nearest neighbor and linear discriminant analysis as base classifier and majority voting technique as combiner. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Ant system-based feature set partitioning algorithm for K-NN and LDA ensembles construction
Published 2015“…Combination of several classifiers has been very useful in improving the prediction accuracy and in most situations multiple classifiers perform better than single classifier.However not all combining approaches are successful at producing multiple classifiers with good classification accuracy because there is no standard resolution in constructing diverse and accurate classifier ensemble.This paper proposes ant system-based feature set partitioning algorithm in constructing k-nearest neighbor (k-NN) and linear discriminant analysis (LDA) ensembles. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
10
-
11
-
12
An Efficient Computational Algorithm for Solving Arbitrary Sylvester Matrix Equations in Fuzzy Control Theory (S/O 14179)
Published 2021“…With that, the constructed algorithm is considered as a new contribution to the application of control system theory…”
Get full text
Get full text
Monograph -
13
Finding objects with segmentation strategy based multi robot exploration in unknown environment
Published 2013“…For constructing map robot can use on built range finder sensor or using vision based systems. …”
Get full text
Get full text
Get full text
Article -
14
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
15
-
16
Network game (Literati) / Chung Mei Kuen
Published 2003“…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
Get full text
Get full text
Thesis -
17
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
Get full text
Get full text
Conference or Workshop Item -
18
An elitist-flower pollination-based strategy for constructing sequence and sequence-less t-way test suite
Published 2018“…In line with the upcoming of a new field called search-based software engineering (SBSE), many newly developed t-way strategies adopting meta-heuristic algorithms can be seen in the literature for constructing interaction test suite (such as simulated annealing (SA), genetic algorithm (GA), ant colony optimisation algorithm (ACO), particle swarm optimisation (PSO), harmony search (HS) and cuckoo search (CS). …”
Get full text
Get full text
Get full text
Article -
19
Wi-Fi signals database construction using chebyshev wavelets for indoor positioning systems
Published 2019“…For the past decade Wi-Fi fingerprinting based indoor positioning systems gained a lot of attention by enterprises as an affordable and flexible solution to track their assets and resources more effectively. …”
Get full text
Get full text
Article -
20
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…Recently, researchers suggested a deep belief network (DBN) algorithm to construct and build a network intrusion detection system (NIDS) for detecting attacks that have not been seen before. …”
Get full text
Get full text
Get full text
Get full text
Thesis
