Search Results - (( java application tools algorithm ) OR ( user computing knowledge algorithm ))
Search alternatives:
- computing knowledge »
- application tools »
- java application »
- tools algorithm »
- user computing »
-
1
-
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project is developed by using Rapid Application Development methodology as it is the model that is most suitable for developing this web tools. …”
Get full text
Get full text
Thesis -
3
Automated time series forecasting
Published 2011“…Moving Average, Decomposition, Exponential Smoothing, Time Series Regressions and ARIMA) were used.The algorithm was developed in JAVA using up to date forecasting process such as data partition, several error measures and rolling process.Successfully, the results of the algorithm tally with the results of SPSS and Excel.This automatic forecasting will not just benefit forecaster but also end users who do not have in depth knowledge about forecasting techniques.…”
Get full text
Get full text
Get full text
Monograph -
4
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
5
-
6
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
7
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
8
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
9
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
10
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…Initially, this tool adopts only Crow Search, Jaya, and Sine Cosine algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
Published 2014“…Most of the victims that involved in this case is an IT illiterate user who literally does not have enough knowledge to differentiate between the fake emails. …”
Get full text
Get full text
Research Reports -
12
A near-optimal centroids initialization in K-means algorithm using bees algorithm
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
Published 2023“…This has led to a great migration of users to cloud computing from other modes of computing. …”
Get full text
Get full text
Thesis -
14
-
15
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014Get full text
Get full text
Undergraduates Project Papers -
16
Image based authentication using zero-knowledge protocol
Published 2018Get full text
Get full text
Conference or Workshop Item -
17
-
18
GPU-based odd and even hybrid string matching algorithm
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
19
-
20
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
