Search Results - (( java implementation some algorithm ) OR ( using ((class using) OR (code using)) algorithm ))

Refine Results
  1. 1

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  2. 2

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  4. 4
  5. 5

    Solving Boundary Value Problems for Ordinary Differential Equations Using Direct Integration and Shooting Techniques by V., Malathi

    Published 1999
    “…Numerical results are discussed indicating the advantages of BVPDI code over COLNEW. The success of the BVP DI code applied to the general class of BVPs is the motivation to con sider the same code for a special class of second order BVPs called Sturm-Liouville (SL) problems. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…The recent trend of software development uses OO paradigm. Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Performance Evaluation Of Combined Code-Space Division Multiple Access With Enhanced Parallel Interference Cancellation by Odeh, Nidhal A.S.

    Published 2007
    “…When a new user requests for a channel, the BS first checks the available signatures in terms of codes and Angle of Arrival (AoA); it then assigns the user with an already used code (used by other users) if they are spatially orthogonal to each other, otherwise an available new code will be assigned. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Optimization of coded signals based on wavelet neural network by Ahmed, Mustafa Sami

    Published 2015
    “…We performed evaluation using 13-bit, 35-bit and 69-bit Barker codes as signal codes to WNN. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    New classes of block backward differentiation formula for solving stiff initial value problems by Musa, Hamisu

    Published 2013
    “…The BDF still remain a foundation for most widely used algorithms. In this thesis, new classes of block methods are developed for the solution of sti® initial value problems. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…Obfuscation involves transforming potentially revealing data, renaming useful classes and variables (identifiers) names to meaningless labels or adding unused or meaningless code to an application binary. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Enhancement of feature sets for subjectivity analysis on Malay-English code-switching text by Kasmuri, Emaliana

    Published 2023
    “…In the unified code-switching feature set, the extracted Malay and English features were unified using an adapted algorithm known as the Malay-English Unified POS. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Constrained clustering approach to aid in remodularisation of object-oriented software systems / Chong Chun Yong by Chong, Chun Yong

    Published 2016
    “…Even if maintainers possess additional information that could be useful to guide and improve the clustering results, traditional clustering algorithms have no way to take advantage of this information. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Using genetic algorithms to optimise land use suitability by Pormanafi, Saeid

    Published 2012
    “…In this study, under environmentfriendliness objective, based on multi-agent genetic algorithms, was developed a geospatial model for the land use allocation. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Multi-class classification automated machine learning for predicting earthquakes using global geomagnetic field data by Qaedi, Kasyful, Abdullah, Mardina, Yusof, Khairul Adib, Hayakawa, Masashi, Zulhamidi, Nur Fatin Irdina

    Published 2025
    “…Through statistical analysis, important features were extracted and a multi-class classification model using geomagnetic data was created. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A Modified Hopfield Neural Network Algorithm (MHNNA) Using ALOS Image for Water Quality Mapping by Ahmed Asal Kzar, Ahmed Asal Kzar, M Jafri, Mohd Zubir, Mutter, Kussay N., Anwar, Saumi Syahreza

    Published 2016
    “…The second group was used to test the MHNNA efficiency. After mapping, the locations of the second group in the produced classes were detected. …”
    Get full text
    Get full text
    Get full text
    Article