Search Results - (( java application optimisation algorithm ) OR ( share information method algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Multiview Laplacian semisupervised feature selection by leveraging shared knowledge among multiple tasks by Krishnasamy, Ganesh, Paramesran, Raveendran

    Published 2019
    “…Recently, considerable advancement has been achieved in semisupervised multitask feature selection methods, which they exploit the shared information from multiple related tasks. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Shamir secret sharing scheme using newton divided difference interpolati / Md Nizam Udin … [et al.] by Udin, Md Nizam, Amin, Farah Azliney, Shahril, Rahmah, Mohd Nasir, Naufal, Ahmad Bzayauddin, Nur Shafiqah

    Published 2017
    “…Rivest, Shamir and Adlemen Algorithm or commonly known as RSA Cryptography proposed in the year 1978 to secure confidential information. …”
    Get full text
    Get full text
    Book Section
  5. 5

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  6. 6

    Enhance efficiency of answering XML keyword query using incompact structure of MCCTree by Sazaly, Ummu Sulaim

    Published 2012
    “…If the result cannot be used directly by the ranking method, the algorithm has an ineffective process. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10

    Image Retrieval System (RGB) by Zahir, Zarith Suraya

    Published 2005
    “…In this project, histogram-based search method is investigated in RGB color space. Histogram search characterizes an image by its color distribution but the drawback of a global histogram representation is that information about object location, shape and texture is discarded. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Meta-scheduler in Grid environment with multiple objectives by using genetic algorithm by Lorpunmanee, Siriluck, Sap, M.N.M, Abdullah, Abdul Hanan, Srinoy, Surat

    Published 2006
    “…This paper proposes and evaluates a new method for job scheduling in heterogeneous computing Systems. …”
    Get full text
    Article
  12. 12

    Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh by Mohammed Saleh, Mohammed Ahmed

    Published 2016
    “…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Resource management algorithms for wavelength division multiplexing optical metro slotted ring networks by Mohammed Abdulrazak, Fuaad Hasan

    Published 2012
    “…The performance of the optical packet ring is highly dependent on the method of resource sharing deployed. In addition, the increase in demand of bandwidth by web applications relying on multicasting has made optical fibers a preferred solution. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Secure encryption in network using Data Encryption Standard (DES) for high security transmission by Abdullah, Nur Amila

    Published 2017
    “…The Data Encryption Standard (DES) algorithm is a symmetric key algorithm for the encryption of electronic and allowed for information. …”
    Get full text
    Get full text
    Student Project
  15. 15
  16. 16
  17. 17
  18. 18

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Thus, proposing the method of reestimating the dropping functions in the RED algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Determinants to knowledge transfer and sharing in multimedia super corridor in Malaysia : the mediating role of trust by Meddour, Houcine

    Published 2016
    “…Partial Least Squares Method (PLS) algorithm and bootstrap techniques were used to test the hypotheses. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Secret sharing scheme for key management of secure data sharing in cloud by Abd Majid, Noorhafezan

    Published 2019
    “…This problem can be overcome by using cryptography uses a single key, but another problem will arises is the potential for a single point of vulnerability if the key fell in the hands of unauthorized persons, then the whole secret and information can be compromised. The objectives of this study were to execute and analyze key generation times for large-scale users using the AES-256 method and Shamir's Secret Sharing Scheme, which both are still using a single key concept and prove Shamir’s Secret Sharing Scheme is more suitable for large-scale users. …”
    Get full text
    Get full text
    Thesis