Search Results - (( java application model algorithm ) OR ( knowledge preservation using algorithm ))
Search alternatives:
- knowledge preservation »
- preservation using »
- application model »
- java application »
- model algorithm »
- using algorithm »
-
1
-
2
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
3
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
4
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
6
-
7
-
8
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
Get full text
Get full text
Final Year Project -
9
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item -
10
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
Get full text
Get full text
Get full text
Thesis -
11
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…In doing so, the old knowledge can be preserved dynamically to overcome the concept drift. …”
Get full text
Get full text
Thesis -
12
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Subjects:Conference paper -
13
Network game (Literati) / Chung Mei Kuen
Published 2003“…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
14
Gajah Olen : Preserving a Malay Wedding Traditional through Crowdsourcing Approach
Published 2020“…There are three main objectives of this project; to design and develop a platform to preserve Malay wedding tradition which is Gajah Olen, to create implicit knowledge of Malay Sarawak wedding tradition by using a crowdsourcing approach and to apply the recommendation system by using collaborative filtering algorithm into a platform for Malay wedding tradition in order to verify the content before publishing it to the public. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
15
Automated time series forecasting
Published 2011Get full text
Get full text
Get full text
Monograph -
16
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The applications of the Internet of Things in different areas and the resources that demand these applications are on the increase. …”
Get full text
Get full text
Article -
17
Blind motion image deblurring using canny edge detector with generative adversarial networks / Idriss Moussa Idriss
Published 2021“…Experiment s are conducted using the GoPro dataset. The proposed combined method has achieved good deblurring with edge-preserving results based on the evaluation metrics used. …”
Get full text
Get full text
Get full text
Thesis -
18
Out-of-core simplification with appearance preservation for computer game applications
Published 2006“…Subsequently, submeshes are simplified using a new variation of vertex clustering technique. …”
Get full text
Get full text
Thesis -
19
Factor Strategy Model: Proofs of Prototype Concept for Software Quality Evaluation
Published 2010“…Thus, by providing an algorithm analyzer to analyze the quality of design of the software product, developers or students can identify possible bad software design in their application.…”
Get full text
Get full text
Article -
20
MFA-OSELM Algorithm For Wifi-Based Indoor Positioning System
Published 2019“…WiFi has exhibited a tremendous capability for internal localization since it is extensively used and easily accessible. Facilitating the use of WiFi for this purpose requires fingerprint formation and the implementation of a learning algorithm with the aim of using the fingerprint to determine locations. …”
Get full text
Get full text
Get full text
Article
