Search Results - (( java application service algorithm ) OR ( knowledge internalization using algorithm ))
Search alternatives:
- knowledge internalization »
- internalization using »
- application service »
- service algorithm »
- java application »
- using algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
3
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
4
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
7
-
8
Document clustering for knowledge discovery using nature-inspired algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Adaptive learning for lemmatization in morphology analysis
Published 2014“…Morphological analysis is used to study the internal structure words by reducing the number of vocabularies used while retaining the semantic meaning of the knowledge in NLP system. …”
Get full text
Conference or Workshop Item -
10
The implementation of z-numbers in fuzzy clustering algorithm for wellness of chronic kidney disease patients
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Optimizing the Management of Knowledge Assets using Swarm Intelligence
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Knowledge base processing method based on text classification algorithm
Published 2023Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Reliability fuzzy clustering algorithm for wellness of elderly people
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004Get full text
Get full text
Thesis -
15
Combining object-based classification and data mining algorithm to classify urban surface materials from worldview-2 satellite image
Published 2014Get full text
Conference or Workshop Item -
16
Discovering association rules for mining images datasets: a proposal
Published 2005Get full text
Get full text
Conference or Workshop Item -
17
Comparative study of apriori-variant algorithms
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Knowledge base tuning using genetic algorithm for fuzzy behavior-based autonomous mobile robot
Published 2005Get full text
Get full text
Conference or Workshop Item -
19
Improving knowledge extraction of Hadith classifier using decision tree algorithm
Published 2012Get full text
Get full text
Get full text
Proceeding Paper -
20
A near-optimal centroids initialization in K-means algorithm using bees algorithm
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item
