Search Results - (( java implementation means algorithm ) OR ( based contracting based algorithm ))
Search alternatives:
- implementation means »
- java implementation »
- based contracting »
- contracting based »
- means algorithm »
-
1
A web-based implementation of k-means algorithms
Published 2022“…The K-means algorithm has been around for over a century. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
Get full text
Get full text
Journal -
3
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
4
Biometrics electronic purse
Published 1999“…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
Get full text
Get full text
Get full text
Proceeding Paper -
5
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020“…PHPMyAdmin is used to store the dataset and also acts as a database for user information. The algorithm chosen was implemented using Java Programming language and was tested using Root Means Square Error (RMSE) formula.…”
Get full text
Get full text
Thesis -
6
Building customer churn prediction models in Indonesian telecommunication company using decision tree algorithm
Published 2023“…Based on the results, the company is suggested to promote a retention program based in order to decrease customer churn rate.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks
Published 2025“…The Adaptive Neuro-Fuzzy Inference System (ANFIS) is used for role-based access control and judge contracts. To improve secure service providing, we perform the detection of malicious and vulnerable users using Improved Cuckoo Optimization and Support Vector Machine (ICO-SVM) and Gated Recurrent Unit and Residual Neural Network (GRU-ResNNet) algorithm in ROS-EB which reduces the vulnerability in the smart home. …”
Article -
8
Image clustering comparison of two color segmentation techniques
Published 2010“…This project proposed a two color segmentation techniques such as K-means and Fuzzy C-means clustering algorithm that are accurately segment the desired images, which have the same color as the pre-selected pixels with background subtraction. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Classification of labour pain using electroencephalogram signal based on wavelet method / Sai Chong Yeh
Published 2020“…Supervised and unsupervised machine learning algorithms particularly the Support Vector Machine (SVM) and Density Based Spatial Clustering of Application with Noise (DBSCAN) are used in this study. …”
Get full text
Get full text
Get full text
Thesis -
10
Development of optimization Alghorithm for uncertain non-linear dynamical system
Published 2004“…The new algorithms also boast faster contractions. Both new algorithms performed better than DISOPE. …”
Get full text
Get full text
Monograph -
11
Machine learning-blockchain based autonomic peer-to-peer energy trading system
Published 2022“…The decentralized P2P trading platform utilizes autonomous pay-per-use billing and energy routing, monitored by a smart contract. A Gated Recurrent Unit (GRU) deep learning-based model, predicts future consumption based on past data aggregated to the blockchain. …”
Get full text
Get full text
Get full text
Article -
12
Labview Based Pid Algorithm Development for Z Motion Control in Atomic Force Microscopy
Published 2015Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Joint torque estimation model of surface electromyography(sEMG) based on swarm intelligence algorithm for robotic assistive device
Published 2014“…Electromyography (EMG) signal measures the electrical signal of muscle contraction. The EMG-based robotics assistive technology would enable the stroke patients to control the robot movement according to the user's own strength of natural movement. …”
Get full text
Get full text
Conference or Workshop Item -
14
An evaluation of smart contracts: practices, legality, and sharī‘ah
Published 2021“…Based on the smart contract, the legal relationship between the involved parties are completed online without being limited to time and space. …”
Get full text
Get full text
Get full text
Book Chapter -
15
Fully decentralized, cost-effective energy demand response management system with a smart contracts-based optimal power flow solution for smart grids
Published 2022“…In this paper, we propose a novel, fully decentralized architecture for an OPF-based demand response management system that uses smart contracts to force generators to comply without the need for a central authority or hardware.…”
Get full text
Get full text
Get full text
Get full text
Article -
16
Wavelet based noise removal from EMG signals
Published 2007“…This paper reports on the effectiveness of the wavelet transform applied to the SEMG signal as means of removing noise to retrieve information related to muscle contraction and nerve system. Power spectrum analysis has been applied to SEMG signals where mean power frequency was calculated to indicate changes in muscle contraction. …”
Get full text
Get full text
Get full text
Article -
17
-
18
Enhancing project completion date prediction using a hybrid model: rule-based algorithm and machine learning algorithm
Published 2025“…The study employs a hybrid predictive model that combines Big Data technologies, Extract Load Transfer (ELT) processes, rule-based algorithms (RBA), machine learning (ML), and Power BI visualizations. …”
Get full text
Get full text
Get full text
Article -
19
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
20
Agent driven Peer-to-Peer Cloud Robotics
Published 2013“…The presence of a relationship and contract based mechanism for trade preserves the fundamental business logics of cloud computing.…”
Get full text
Get full text
Get full text
Conference or Workshop Item
