Search Results - (( java application means algorithm ) OR ( using composition selection algorithm ))

Refine Results
  1. 1

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…The K-means algorithm has been around for over a century. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2
  3. 3

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
    Get full text
    Get full text
    Journal
  4. 4

    Optimal QoS aware multiple paths web service composition using heuristic algorithms and data mining techniques by Qtaish, Osama Kayed Taher

    Published 2014
    “…A further research challenge is the determination of the QoS characteristics that can be considered as selection criteria. In this thesis, a smart QoS-aware service composition approach is proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Mutable Composite Firefly Algorithm for Microarray-Based Cancer Classification by Fajila, Fathima, Yusof, Yuhanis

    Published 2024
    “…In addition, the local optima issue is overcome by the population reinitialisation method. The proposed algorithm, named the CFS-Mutable Composite Firefly Algorithm (CFS-MCFA), is evaluated based on two metrics, namely classification accuracy and genes subset size, using a Support Vector Machine (SVM) classifier. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Biometrics electronic purse by Abdul Rahman, Abdul Wahab, Eng, Chong Tan, S., M. Heng

    Published 1999
    “…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Java based expert system for selection of natural fibre composite materials by Ahmed Ali, Basheer A., Salit, Mohd Sapuan, Zainudin, Edi Syams, Othman, Mohamed

    Published 2013
    “…Many research papers are published in the field of materials selection for manufacturing process and design of polymer composite materials. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Enhancement of Single and Composite Images Based on Contourlet Transform Approach by Melkamu, Hunegnaw Asmare

    Published 2009
    “…Based on this investigation an optimal color space is selected for both single image and composite image enhancement approaches. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This will involve the explanation of the use of evolution algorithms combined with the music programming to be able to create creative digital music.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14
  15. 15
  16. 16
  17. 17

    Improving the performance of damage repair in thin-walled structures with analytical data and machine learning algorithms by Shaikh, Abdul Aabid, Raheman, Md Abdul, Hrairi, Meftah, Baig, Muneer

    Published 2024
    “…An analytical model was formulated for a single-sided composite patch repair using linear elastic fracture mechanics and Rose's analytical modelling. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Adaptive web service selection based on data type matching for dynamic web service composition by Ramasamy, R Kanesaraj, Fang, Fang Chua, Su, Cheng Haw, Chin, Kuan Ho

    Published 2015
    “…Although there are many web services provided for access in World Wide Web (WWW), some services are not available at all times.It is very important to ensure all services are available when a service composition takes place.A web service that meets the requirements of the workflow but does not match the data type will still cause a failure in composition.To address this concern, we propose an adaptive web service selection method which is able to replace a current web service which has been used for composition but fails during execution time.The proposed algorithm will select the most appropriate web service based on web service discovery engine recommendation and match the requirement based on WSDL description. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis