Search Results - (( java implementation some algorithm ) OR ( managers detection based algorithm ))

Refine Results
  1. 1

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    Implementation of RIO in UMJaNetSim / Chan Chin We by Chan, Chin We

    Published 2004
    “…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
    Get full text
    Get full text
    Thesis
  10. 10

    A review on object detection algorithms based deep learning methods / Wan Xing ... [et al.] by Wan Xing, Sultan Mohd, Mohd Rizman, Johari, Juliana, Ahmat Ruslan, Fazlina

    Published 2023
    “…Deep learning-based object detection algorithms can be categorized into three main types: end-to-end algorithms, two-stage algorithms, and one-stage algorithms. …”
    Get full text
    Get full text
    Article
  11. 11

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  14. 14

    PeerMate: a malicious peer detection algorithm for P2P systems based on MSPCA by Wei, Xianglin, Ahmed, Tarem, Chen, Ming, Pathan, Al-Sakib Khan

    Published 2012
    “…Firstly, we divide the malicious peers into six categories; secondly, we bring forward PeerMate, a malicious peers detection algorithm based on Multiscale Principal Component Analysis (MSPCA) and Quality of Reconstruction (QR), to detect malicious peers in reputation based P2P systems; finally, we show through simulations that PeerMate can detect malicious peers efficiently and accurately.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    Dingle's Model-based EEG Peak Detection using a Rule-based Classifier by Asrul, Adam, Norrima, Mokhtar, Marizan, Mubin, Zuwairie, Ibrahim, Mohd Ibrahim, Shapiai

    Published 2015
    “…The employment of peak detection algorithm is prominent in several clinical applications such as diagnosis and treatment of epilepsy patients, assisting to determine patient syndrome, and guiding paralyzed patients to manage some devices. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition by Yuri, Nur Fatin Izzati

    Published 2017
    “…In this project, the algorithm is developed based on four main algorithms which are the detection algorithm, the tracking algorithm, the preprocessing algorithm and the drowsiness signs analysis algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Testing static single cell faults using static and dynamic data background by Zakaria, Nor Azura, Wan Hasan, Wan Zuha, Abdul Halin, Izhal, Mohd Sidek, Roslina, Wen, Xiaoqing

    Published 2011
    “…It is also shown that Mod March CL(12N) and Mod March SR(14N) with DB management can detect all Static Single Cell Faults based on the Bit-Oriented-Memories (BOM) test method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Comparison on machine learning algorithm to fast detection of malicious web pages by Wan Nurul Safawati, Wan Manan, Mohd Nizam, Mohmad Kahar, Noorlin, Mohd Ali

    Published 2021
    “…Furthermore, previous approached have used blacklist technique which a conventional method and have shown promising result in detecting malicious webpages. Therefore, implementing the principle of the machine learning, which is training the classification algorithm will be perform to improve the detection accuracy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Detecting Duplicate Entry in Email Field using Alliance Rules-based Algorithm by Arif, Hanafi, Sulaiman, Harun, Enggari, Sofika, Rani, Larissa Navia

    Published 2016
    “…It provides an algorithm to the discovery of error and duplicates entries in the data sets of existing data warehouse. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article