Search Results - (( java implementation case algorithm ) OR ( using field using algorithm ))

Refine Results
  1. 1

    Java based expert system for selection of natural fibre composite materials by Ahmed Ali, Basheer A., Salit, Mohd Sapuan, Zainudin, Edi Syams, Othman, Mohamed

    Published 2013
    “…There are several algorithm and methods are being proposed by various researchers in this field. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Several algorithms, methods and spreadsheets are being proposed by various researchers in this field to improve materials selection. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Pairwise testing tools based on hill climbing algorithm (PTCA) by Lim, Seng Kee

    Published 2014
    “…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7
  8. 8
  9. 9

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
    Review
  10. 10

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Visualisation tool to study malaria transmission using network modelling by Wong,, Ji Yeh

    Published 2014
    “…Java was used to implement the visualisation tool. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  13. 13

    Indoor positioning using weighted magnetic field signal distance similarity measure and fuzzy based algorithms by Bundak, Caceja Elyca

    Published 2021
    “…This thesis analyses the positioning accuracy changes by using different similarity measures on a specific magnetic field vector and proposed an algorithm using different weighted magnetic field signal distance similarity measures. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Improved algorithms of elliptic curve point multiplication over binary and prime fields using elliptic net by Muslim, Norliana

    Published 2022
    “…The primary objective of this study is to improve the performance of ECPM algorithm of ECC using the elliptic net (EN) method in affine coordinate over binary and prime fields. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa... by Noor Hamid, Ahmad Asif Bakhtiar Noor, Nor Zailan, Nor Syazwani, Ishak, Syaza Farlisa

    Published 2019
    “…ECC can be perfonn by using either finite field or binary field. Text encryption using ECC over bina1y finite ticld, G/(2"' ) has more advantage than Ctnitc field, Gf(p) but the previous study that use ECC and EIGamal for text encryption only represent the system using Gf(p). …”
    Get full text
    Get full text
    Student Project
  16. 16
  17. 17

    Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields by Al-Saffar, Najlae Falah Hameed

    Published 2015
    “…The proposed algorithm using NAF to represent the scalar in ECSM reduced the cost of computation of the ECSM by comparing with using the binary and NAF algorithm respectively. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Inverse problem: comparison between linear back-projection algorithm and filtered back-projection algorithm in soft-field tomography by Yasmin, Abdul Wahab, Ruzairi, Abdul Rahim, Fazalul, Rahiman, Suzzana, Ridzuan Aw, Fazlul Rahman, Mohd Yunus, Jaysuman, Pusppanathan, Nor Muzakkir , Nor Ayob, Leow, Pei Ling

    Published 2017
    “…The objectives of this paper are: (1) to compare the result from LBP and FBP algorithm in soft-field tomography, and (2) to investigate the effect of FBP algorithm to a reconstructed image in soft-field tomography. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20