Search Results - (( java implementation _ algorithm ) OR ( using function (matching OR machine) algorithm ))

Refine Results
  1. 1

    Network monopoly / Tan Kean Yeap by Tan , Kean Yeap

    Published 2002
    “…Moreover, because of the expanding memory anda processing power of these computers, users can put the machine to work on new kinds of applications and functions. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Sports tournament scheduling using genetic algorithm / Hafeezur Syakir Abdul Motok@Mohd Ridzuan by Abdul Motok@Mohd Ridzuan, Hafeezur Syakir

    Published 2020
    “…The functionality testing is conducted using Blackbox testing technique to test the functionality of the project.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Development of open platform controller for step-NC compliant CNC system by Chi Adam, Mohd Khairil Anbia

    Published 2020
    “…The hardware of the system was upgraded with the new servo system combined with SSCNET implementation to improve the functionality and efficiency of the new system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    An improved fast scanning algorithm based on distance measure and threshold function in region image segmentation by Ismael, Ahmed Naser

    Published 2016
    “…Such an approach leads to a weak reliability and shape matching of the produced segments. Hence, this study proposes an Improved Fast Scanning algorithm that is based on Sorensen distance measure and adaptive threshold function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    A new text-based w-distance metric to find the perfect match between words by Ali, M., Jung, L.T., Hosam, O., Wagan, A.A., Shah, R.A., Khayyat, M.

    Published 2020
    “…The k-NN algorithm is an instance-based learning algorithm which is widely used in the data mining applications. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  9. 9

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Assisted History Matching by Using Genetic Algorithm and Discrete Cosine Transform by Abdul Rashid, Abdul Hadi

    Published 2014
    “…Then the proposed algorithm for DCT and GA can be applied to the history matching problem. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    A Study On The Application Of Gravitational Search Algorithm In Optimizing Stereo Matching Algorithm’s Parameters For Star Fruit Inspection System by Zainal Abidin, Amar Faiz, Mohd Ali, Nursabillilah, Mat Zain, Norlina, Abdul Majid, Masmaria, Rifin, Rozi, Kadiran, Kamaru Adzha, Mohd Mokji, Ahmad Musa, Tan, Kok, Amirulah, Rahman

    Published 2018
    “…The hardware for the inspection system is built by CvviP from Universiti Teknologi Malaysia using only single camera. The implemented Stereo Matching Algorithm used on the system comes from the built-in Matlab library. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Text searching algorithm using boyer moore horspool (BMH) algorithm by Siti Nurafiqah, Jaafar

    Published 2015
    “…The objective of this study is to develop a searching function using Boyer-Moore Horspool algorithm based on keyword in a medical database. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15
  16. 16

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Indoor positioning using weighted magnetic field signal distance similarity measure and fuzzy based algorithms by Bundak, Caceja Elyca

    Published 2021
    “…A matching algorithm is used to match between the top 10 ranked RPs with the nearest Euclidean distance to the TP with the RPs clustered. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A fingerprint matching algorithm using bit-plane extraction method with phase-only correlation by Florence, Francis-Lothai, Bong, David B L

    Published 2017
    “…Before bit-plane is extracted, the fingerprint image is enhanced by using Fourier transform. Bit-plane 7 of the enhanced image is used as the input for fingerprint matching with phase-only correlation (POC) function. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Disparity map algorithm for stereo matching process using local based method by Gan, Melvin Yeou Wei

    Published 2022
    “…Global method performs a matching process using global energy or a probability function over the whole image. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis