Search Results - (( java implication based algorithm ) OR ( data information through algorithm ))

Refine Results
  1. 1
  2. 2

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…Whereas the process of examining through the web pages, retrieving and searching the relevant data in a liTML page, and selecting the best satisfying data are based on the features and operations of the Genetic Algorithms.…”
    Get full text
    Get full text
    Thesis
  3. 3

    DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE by FLORISCA, ALDINA GODULUS

    Published 2019
    “…Previously, many encryption algorithms have been investigated. The Cryptography Algorithm is used to protect data through encryption that allows sensitive information to be passed through the network safely. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  4. 4

    Book recommender mobile application / Amir Imran Kamaludin by Kamaludin, Amir Imran

    Published 2021
    “…Recommendation system solves this problem by automatically sorting through the massive amounts of data and identify user’s interest and makes the information searching much more easily. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Automated update of crowdsourced data in participatory sensing: An application for crowdsourced price information by Syafiq F., Ismail H., Aris H., Yusof S.

    Published 2023
    “…Widespread use of mobile devices has resulted in the creation of large amounts of data. An example of such data is the one obtained from the public (crowd) through open calls, known as crowdsourced data. …”
    Article
  6. 6

    Genetic Algorithm for Web Data Mining by Loo, Kevin Teow Aik

    Published 2001
    “…By doing so, it could assist the process of data mining for information in the World Wide Web. …”
    Get full text
    Get full text
    Project Paper Report
  7. 7

    Information Security Analysis and Solution using LSB Steganography and AES Cryptographic Algorithm by Nurul Adha, Oktarini Saputri, Novita Epa, Sari

    Published 2023
    “…As a result, information technology has advanced more, particularly in the areas of security and data secrecy. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Encrypted mobile messaging application using 3D-AES block cipher cryptography algorithm / Aida Najihah Mohd Khlubi by Mohd Khlubi, Aida Najihah

    Published 2019
    “…This paper analyzes how information sent through mobile messaging application is being secured. …”
    Get full text
    Get full text
    Student Project
  10. 10
  11. 11

    Tag clouds algorithm with the inclusion of personality traits by Ahmad Affandi, Supli

    Published 2015
    “…The algorithm was then tested through a black box testing. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Balancing data utility versus information loss in data-privacy protection using k-Anonymity by Esmeel, Thamer Khalil, Hasan, Md Munirul, Kabir, Muhammad Nomani, Ahmad, Firdaus

    “…In this research, we investigated a privacy technique, k-anonymity for different values of k on different number c of columns of the dataset. Next, the information loss due to k-anonymity is computed. The anonymized files go through the classification process by some machine-learning algorithms i.e., Naive Bayes, J48 and neural network in order to check a balance between data anonymity and data utility. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    COVID-19 DATA EXPLORATION USING MAPPER ALGORITHM by Carey, Ling Yu Fan

    Published 2023
    “…Application of mapper algorithm through Kepler Mapper, a python implementation of mapper is done to construct mapper graphs for state wise COVID�19 data in Malaysia along year 2021. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  14. 14
  15. 15

    Individual-tree segmentation and extraction based on LiDAR point cloud data by Liu, Xiaofeng, Abdullah, Muhamad Taufik, Mustaffa, Mas Rina, Nasharuddin, Nurul Amelina

    Published 2024
    “…Utilizing LiDAR point cloud data and ground-measured data from 30 plots, we examined the sensitivity of individual tree segmentation to key parameters by varying the grid values of the point cloud distance discriminant clustering algorithm and adjusting the canopy height resolution (CHR) of the watershed algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Feedback given to the user to inform them of methods by which they can improve their plant’s health condition, derived through the information generated from the data-mining module. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Comparison of Statistic Prediction Results in Weka Explorer Interface and Experimenter Environment Interface on Dataset by Thamer Khalil, Esmeel, Roslina, Abd Hamid, Rahmah, Mokhtar

    Published 2019
    “…With more data collected for analytical purposes. Techniques data mining through Weka Explorer interface and experimental environment interface into determining the prediction and accuracy using different algorithm ratings to know the performance of best. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Restaurant review system with data visualization and text search using TF-IDF algorithm / Syazwina Abd Hamid by Abd Hamid, Syazwina

    Published 2020
    “…Hence, this project focuses on the integration of information retrieval with data visualization in order to produce valuable insights. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Enhancing cloud data security using hybrid of advanced encryption standard and Blowfish encryption algorithms by -, Salma, Olanrewaju, Rashidah Funke, Abdullah, Khaizuran, -, Rusmala, Darwis, Herdianti

    Published 2019
    “…The importance of cloud computing comes out with the security of data accessibility, reliability and reliability of information. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper