Search Results - (( java application designing algorithm ) OR ( data combination method algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms by Teoh, Chin Chuang

    Published 2005
    “…In cluster generating process, the developed BBSI algorithm was used to select the best band combination for generating cluster by using Iterative self- Organizing Data Analysis (ISODATA) technique. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Neural Networks Ensemble: Evaluation of Aggregation Algorithms for Forecasting by HASSAN, SAIMA

    Published 2013
    “…These algorithms include equal�weights combination of Best NN models, combination of trimmed forecasts, combination through Variance-Covariance method and Bayesian Model Averaging. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Group method of data handling with artificial bee colony in combining forecasts by Yahya, Nurhaziyatul Adawiyah, Samsudin, Ruhaidah, Darmawan, Irfan, Kasim, Shahreen

    Published 2018
    “…This study is done by combining individual forecasts of Group Method of Data Handling models using the weighted-based combine approach. …”
    Get full text
    Get full text
    Article
  7. 7

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    An efficient secure ECG compression based on 2D-SPIHT and SIT algorithm by Jati, Grafika, Rachmasari, Ardina Rizqy, Jatmiko, Wisnu, Mursanto, Petrus, Sediono, Wahju

    Published 2017
    “…This research proposes an efficient combination of a compression and an encryption algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Ideal combination feature selection model for classification problem based on bio-inspired approach by Basir, Mohammad Aizat, Hussin, Mohamed Saifullah, Yusof, Yuhanis

    Published 2020
    “…The important step is to idealize the combined feature selection models by finding the best combination of search method and feature selection algorithms. …”
    Get full text
    Get full text
    Book Section
  11. 11

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…The combined method is called Hybrid K-MeansCGA. Modifications of K-Means structures were done by inserting genetic algorithm operators and tuning the population. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Robust combining methods in committee neural networks by Kenari, Seyed Ali Jafari, Mashohor, Syamsiah

    Published 2011
    “…Therefore, we have used a Genetic Algorithm (GA) method to combine the individuals with the Huber and Bisquare as the fitness functions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15
  16. 16

    Shape-based recognition using combined Jaccard and Mahalanobis measurement / Noor Aznimah Abdul Aziz by Abdul Aziz, Noor Aznimah

    Published 2013
    “…This proposed combined algorithms and techniques can achieve high performance in shape similarity measurement recognition and also the masking technique in Mahalanobis distance measurement can reduce the amount of data analysis.…”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Breast cancer disease classification using fuzzy-ID3 algorithm with FUZZYDBD method: automatic fuzzy database definition by Nur Farahaina, Idris, Mohd Arfian, Ismail

    Published 2021
    “…FUZZYDBD method, an automatic fuzzy database definition method, would be used to design the fuzzy database for fuzzification of data in the FID3 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
    Get full text
    Get full text
    Thesis
  20. 20

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
    Get full text
    Get full text
    Conference or Workshop Item