Search Results - (( java implementation level algorithm ) OR ( using function (matching OR machine) algorithm ))

Refine Results
  1. 1

    Network monopoly / Tan Kean Yeap by Tan , Kean Yeap

    Published 2002
    “…Moreover, because of the expanding memory anda processing power of these computers, users can put the machine to work on new kinds of applications and functions. …”
    Get full text
    Get full text
    Thesis
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Sports tournament scheduling using genetic algorithm / Hafeezur Syakir Abdul Motok@Mohd Ridzuan by Abdul Motok@Mohd Ridzuan, Hafeezur Syakir

    Published 2020
    “…The functionality testing is conducted using Blackbox testing technique to test the functionality of the project.…”
    Get full text
    Get full text
    Thesis
  4. 4

    An improved fast scanning algorithm based on distance measure and threshold function in region image segmentation by Ismael, Ahmed Naser

    Published 2016
    “…Such an approach leads to a weak reliability and shape matching of the produced segments. Hence, this study proposes an Improved Fast Scanning algorithm that is based on Sorensen distance measure and adaptive threshold function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    A new text-based w-distance metric to find the perfect match between words by Ali, M., Jung, L.T., Hosam, O., Wagan, A.A., Shah, R.A., Khayyat, M.

    Published 2020
    “…The k-NN algorithm is an instance-based learning algorithm which is widely used in the data mining applications. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Assisted History Matching by Using Genetic Algorithm and Discrete Cosine Transform by Abdul Rashid, Abdul Hadi

    Published 2014
    “…Then the proposed algorithm for DCT and GA can be applied to the history matching problem. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    A Study On The Application Of Gravitational Search Algorithm In Optimizing Stereo Matching Algorithm’s Parameters For Star Fruit Inspection System by Zainal Abidin, Amar Faiz, Mohd Ali, Nursabillilah, Mat Zain, Norlina, Abdul Majid, Masmaria, Rifin, Rozi, Kadiran, Kamaru Adzha, Mohd Mokji, Ahmad Musa, Tan, Kok, Amirulah, Rahman

    Published 2018
    “…The hardware for the inspection system is built by CvviP from Universiti Teknologi Malaysia using only single camera. The implemented Stereo Matching Algorithm used on the system comes from the built-in Matlab library. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Text searching algorithm using boyer moore horspool (BMH) algorithm by Siti Nurafiqah, Jaafar

    Published 2015
    “…The objective of this study is to develop a searching function using Boyer-Moore Horspool algorithm based on keyword in a medical database. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12
  13. 13

    Indoor positioning using weighted magnetic field signal distance similarity measure and fuzzy based algorithms by Bundak, Caceja Elyca

    Published 2021
    “…A matching algorithm is used to match between the top 10 ranked RPs with the nearest Euclidean distance to the TP with the RPs clustered. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A fingerprint matching algorithm using bit-plane extraction method with phase-only correlation by Florence, Francis-Lothai, Bong, David B L

    Published 2017
    “…Before bit-plane is extracted, the fingerprint image is enhanced by using Fourier transform. Bit-plane 7 of the enhanced image is used as the input for fingerprint matching with phase-only correlation (POC) function. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Disparity map algorithm for stereo matching process using local based method by Gan, Melvin Yeou Wei

    Published 2022
    “…Global method performs a matching process using global energy or a probability function over the whole image. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Binary Coati Optimization Algorithm- Multi- Kernel Least Square Support Vector Machine-Extreme Learning Machine Model (BCOA-MKLSSVM-ELM): A New Hybrid Machine Learning Model for Pr... by Sammen S.S., Ehteram M., Sheikh Khozani Z., Sidek L.M.

    Published 2024
    “…For water level prediction, lagged rainfall and water level are used. In this study, we used extreme learning machine (ELM)-multi-kernel least square support vector machine (ELM-MKLSSVM), extreme learning machine (ELM)-LSSVM-polynomial kernel function (PKF) (ELM-LSSVM-PKF), ELM-LSSVM-radial basis kernel function (RBF) (ELM-LSSVM-RBF), ELM-LSSVM-Linear Kernel function (LKF), ELM, and MKLSSVM models to predict water level. …”
    Article
  19. 19
  20. 20

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis