Search Results - (( java application means algorithm ) OR ( using composition selection algorithm ))
Search alternatives:
- composition selection »
- selection algorithm »
- application means »
- using composition »
- java application »
- means algorithm »
-
1
A web-based implementation of k-means algorithms
Published 2022“…The K-means algorithm has been around for over a century. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
-
3
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
Get full text
Get full text
Journal -
4
Optimal QoS aware multiple paths web service composition using heuristic algorithms and data mining techniques
Published 2014“…A further research challenge is the determination of the QoS characteristics that can be considered as selection criteria. In this thesis, a smart QoS-aware service composition approach is proposed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
6
Mutable Composite Firefly Algorithm for Microarray-Based Cancer Classification
Published 2024“…In addition, the local optima issue is overcome by the population reinitialisation method. The proposed algorithm, named the CFS-Mutable Composite Firefly Algorithm (CFS-MCFA), is evaluated based on two metrics, namely classification accuracy and genes subset size, using a Support Vector Machine (SVM) classifier. …”
Get full text
Get full text
Get full text
Article -
7
Biometrics electronic purse
Published 1999“…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
9
-
10
Java based expert system for selection of natural fibre composite materials
Published 2013“…Many research papers are published in the field of materials selection for manufacturing process and design of polymer composite materials. …”
Get full text
Get full text
Get full text
Article -
11
Enhancement of Single and Composite Images Based on Contourlet Transform Approach
Published 2009“…Based on this investigation an optimal color space is selected for both single image and composite image enhancement approaches. …”
Get full text
Get full text
Thesis -
12
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis -
13
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This will involve the explanation of the use of evolution algorithms combined with the music programming to be able to create creative digital music.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Mining Sequential Patterns Using I-PrefixSpan
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
15
-
16
Text messaging encryption system
Published 2012Get full text
Get full text
Undergraduates Project Papers -
17
Improving the performance of damage repair in thin-walled structures with analytical data and machine learning algorithms
Published 2024“…An analytical model was formulated for a single-sided composite patch repair using linear elastic fracture mechanics and Rose's analytical modelling. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
18
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Adaptive web service selection based on data type matching for dynamic web service composition
Published 2015“…Although there are many web services provided for access in World Wide Web (WWW), some services are not available at all times.It is very important to ensure all services are available when a service composition takes place.A web service that meets the requirements of the workflow but does not match the data type will still cause a failure in composition.To address this concern, we propose an adaptive web service selection method which is able to replace a current web service which has been used for composition but fails during execution time.The proposed algorithm will select the most appropriate web service based on web service discovery engine recommendation and match the requirement based on WSDL description. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis
