Search Results - (( java implementation new algorithm ) OR ( using ((class using) OR (code using)) algorithm ))

Refine Results
  1. 1

    Biometrics electronic purse by Abdul Rahman, Abdul Wahab, Eng, Chong Tan, S., M. Heng

    Published 1999
    “…A 56-bit DES encryption algorithm can easily be broken in just 2 to 3 days using the EFF DES CRACKER, an unclassified ASIC machine. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We extracted 30 different features from network traffic. We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Solving Boundary Value Problems for Ordinary Differential Equations Using Direct Integration and Shooting Techniques by V., Malathi

    Published 1999
    “…Numerical results are discussed indicating the advantages of BVPDI code over COLNEW. The success of the BVP DI code applied to the general class of BVPs is the motivation to con sider the same code for a special class of second order BVPs called Sturm-Liouville (SL) problems. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Development of open platform controller for step-NC compliant CNC system by Chi Adam, Mohd Khairil Anbia

    Published 2020
    “…Therefore, this study covers the system which has been designed and developed from outdated and conventional PROLIGHT 1000 Milling CNC machine from Light Intelitek as the lesser cost solution which further discussed in detail based upon upgrades of hardware, architecture, and algorithm design. The hardware of the system was upgraded with the new servo system combined with SSCNET implementation to improve the functionality and efficiency of the new system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Performance Evaluation Of Combined Code-Space Division Multiple Access With Enhanced Parallel Interference Cancellation by Odeh, Nidhal A.S.

    Published 2007
    “…When a new user requests for a channel, the BS first checks the available signatures in terms of codes and Angle of Arrival (AoA); it then assigns the user with an already used code (used by other users) if they are spatially orthogonal to each other, otherwise an available new code will be assigned. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Optimization of coded signals based on wavelet neural network by Ahmed, Mustafa Sami

    Published 2015
    “…We performed evaluation using 13-bit, 35-bit and 69-bit Barker codes as signal codes to WNN. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    New classes of block backward differentiation formula for solving stiff initial value problems by Musa, Hamisu

    Published 2013
    “…The BDF still remain a foundation for most widely used algorithms. In this thesis, new classes of block methods are developed for the solution of sti® initial value problems. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…Obfuscation involves transforming potentially revealing data, renaming useful classes and variables (identifiers) names to meaningless labels or adding unused or meaningless code to an application binary. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Enhancement of feature sets for subjectivity analysis on Malay-English code-switching text by Kasmuri, Emaliana

    Published 2023
    “…In the unified code-switching feature set, the extracted Malay and English features were unified using an adapted algorithm known as the Malay-English Unified POS. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Constrained clustering approach to aid in remodularisation of object-oriented software systems / Chong Chun Yong by Chong, Chun Yong

    Published 2016
    “…Even if maintainers possess additional information that could be useful to guide and improve the clustering results, traditional clustering algorithms have no way to take advantage of this information. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Using genetic algorithms to optimise land use suitability by Pormanafi, Saeid

    Published 2012
    “…In this study, under environmentfriendliness objective, based on multi-agent genetic algorithms, was developed a geospatial model for the land use allocation. …”
    Get full text
    Get full text
    Thesis
  17. 17

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  18. 18

    Multi-class classification automated machine learning for predicting earthquakes using global geomagnetic field data by Qaedi, Kasyful, Abdullah, Mardina, Yusof, Khairul Adib, Hayakawa, Masashi, Zulhamidi, Nur Fatin Irdina

    Published 2025
    “…Through statistical analysis, important features were extracted and a multi-class classification model using geomagnetic data was created. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Fitness value based evolution algorithm approach for text steganalysis model by Din, Roshidi, Samsudin, Azman, Tuan Muda, Tuan Zalizam, Lertkrai, P., Amphawan, Angela, Omar, Mohd Nizam

    Published 2013
    “…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
    Get full text
    Get full text
    Article
  20. 20

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis