Search Results - (( java application tools algorithm ) OR ( user computing using algorithm ))

Refine Results
  1. 1

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2
  3. 3

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project is developed by using Rapid Application Development methodology as it is the model that is most suitable for developing this web tools. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Automated time series forecasting by Ismail, Suzilah, Zakaria, Rohaiza, Tuan Muda, Tuan Zalizam

    Published 2011
    “…Moving Average, Decomposition, Exponential Smoothing, Time Series Regressions and ARIMA) were used.The algorithm was developed in JAVA using up to date forecasting process such as data partition, several error measures and rolling process.Successfully, the results of the algorithm tally with the results of SPSS and Excel.This automatic forecasting will not just benefit forecaster but also end users who do not have in depth knowledge about forecasting techniques.…”
    Get full text
    Get full text
    Get full text
    Monograph
  6. 6
  7. 7
  8. 8

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The user’s requirements will be collected using a quantitative questionnaire online surveying tool. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  9. 9
  10. 10

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  13. 13
  14. 14
  15. 15

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…Initially, this tool adopts only Crow Search, Jaya, and Sine Cosine algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Restaurant locator using Djikstra Algorithm / Mohamad Aliff Hakimi Lukman Hakim by Lukman Hakim, Mohamad Aliff Hakimi

    Published 2017
    “…In network theory, it’s known as the shortest-path problem, and Dijkstra’s algorithm is usually used to solve it. Dijkstra’s algorithm is one of the classic shortest path search algorithms. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Performance-aware cost-effective brokering and load balancing algorithms for data center in large scale cloud computing by Naha, Ranesh Kumar

    Published 2015
    “…It helps organization to reduce computing infrastructure cost. Incloud computing concept, cloud users can use computing resources according to their needs and requirements. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Phishing attack detection using machine learning method by Jupin, John Arthur

    Published 2019
    “…However, in this wide use of this computer network, the privacy of computer users is in danger. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers