Search Results - (( java implementing function algorithm ) OR ( a simulation mining algorithm ))
Search alternatives:
- implementing function »
- function algorithm »
- java implementing »
- simulation mining »
- mining algorithm »
- a simulation »
-
1
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
Get full text
Get full text
Final Year Project -
2
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
3
Modeling and simulation of the industrial numerical distance relay aimed at knowledge discovery in resident event reporting
Published 2014“…With the successful modeling and simulation of the AREVA MiCOM P441 distance relay and its recording facility, such subsequent works as data extraction and preparation, computational intelligence-based data mining for relay decision algorithm discovery and finally a relay analysis expert system development can certainly be executed. …”
Get full text
Get full text
Article -
4
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020“…PHPMyAdmin is used to store the dataset and also acts as a database for user information. The algorithm chosen was implemented using Java Programming language and was tested using Root Means Square Error (RMSE) formula.…”
Get full text
Get full text
Thesis -
6
Framework for mining XML format business process log data
Published 2024“…Therefore, a lot of frequent subtree mining (FSM) algorithms and methods were developed to get information from semi-structured data specifically data with hierarchical nature. …”
Get full text
Get full text
Thesis -
7
A prototype for context identification of scientific papers via agent-based text mining
Published 2023Conference Paper -
8
A partition based feature selection approach for mixed data clustering / Ashish Dutt
Published 2020“…Traditional data mining algorithms cannot be directly applied to educational problems, as they may have a specific objective and function. …”
Get full text
Get full text
Get full text
Thesis -
9
Songs Search Using Human Humming Voice
Published 2007“…The system has the functionality of humming voice recording and algorithms comparing both humming voice and song files in the system to fmd the right song. …”
Get full text
Get full text
Final Year Project -
10
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
11
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…E-Certificate helps eliminate many problems that is associated with physical printed certificate such costs, management, and forgery problem. Even though implementation of such E-Certificate have been implemented around the globe, it has not been implemented for workshops in UiTM. …”
Get full text
Get full text
Thesis -
12
Comparative analysis of danger theory variants in measuring risk level for text spam messages
Published 2024journal::journal article -
13
Data Mining On Machine Breakdowns And Effectiveness Of Scheduled Maintenance
Published 2019“…Second, a proposed simulation model for the operational process was designed based on a real medical tool manufacturing plant. …”
Get full text
Get full text
Monograph -
14
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
Get full text
Get full text
Thesis -
15
Multi-Objective Hybrid Algorithm For The Classification Of Imbalanced Datasets
Published 2019“…A new self-adaptive hybrid algorithm (CSCMAES) is introduced for optimization. …”
Get full text
Get full text
Thesis -
16
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
17
-
18
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…The KDD approach was applied on a simulated event report recording ‘extracted’ from a numerical distance relay that had been modeled to emulate an actual distance protective relay device used by TNB, a Malaysian utility company. …”
Get full text
Get full text
Thesis -
19
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
20
