Search Results - (( java implication based algorithm ) OR ( using store study algorithm ))

Refine Results
  1. 1

    Restock management system by using market basket analysis / Nazrin Adnan by Adnan, Nazrin

    Published 2016
    “…This study is focus on Market Basket Analysis which is analyze the customer purchase behavior from previous purchases by using apriori algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    A Study Of Salting Method for Image Protection by Ahmad Faeez bin Lukman

    Published 2013
    “…The general purpose of using this method is mainly because it provides the best type of security towards images, by implementing the method on the passwords used to gain access to the image stored in the database. …”
    Other
  5. 5
  6. 6

    Expanding the data capacity of QR codes using multiple compression algorithms and base64 encode/decode by Abas, Azizi, Yusof, Yuhanis, Ahmad, Farzana Kabir

    Published 2017
    “…One of the technique to increase data capacity is by compressing the data and encode it with a suitable data encoder. This study focuses on the selection of compression algorithms and use base64 encoder/decoder to increase the capacity of data which is to be stored in the QR code. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Data Analysis and Rating Prediction on Google Play Store Using Data-Mining Techniques by Kayalvily, Tabianan, Denis, Arputharaj, Mohd Norshahriel, Abd Rani, Sarasvathi, Nahalingham

    Published 2022
    “…This study aims to predict the ratings of Google Play Store apps using decision trees for classification in machine learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection by Siswanto, Apri, Katuk, Norliza, Ku-Mahamud, Ku Ruhana

    Published 2020
    “…Hence, this study aims to improve the limitations found in the existing chaotic-based encryption algorithms for FTP by improving its encryption speed using Henon and Logistic map. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection by Dhany, Saputra

    Published 2008
    “…A comprehensive performance study has been reported that PrefixSpan, one of the sequential pattern mining algorithms, outperforms GSP, SPADE, as well as FreeSpan in most cases, and PrefixSpan integrated with pseudoprojection technique is the fastest among those tested algorithms. …”
    Get full text
    Thesis
  11. 11

    Increasing data storage of coloured QR code using CoMMT technique by Abas, Azizi, Yusof, Yuhanis, Din, Roshidi, Azzali, Fazli, Osman, Baharudin

    Published 2020
    “…Quick Response (QR) Code is a printed code of black and white squares that is able to store data without the use of any of the electronic devices. …”
    Get full text
    Get full text
    Article
  12. 12

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…Diffie-Hellman algorithm is used to determine the pixel on an image that will be used to store the message. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection by Saputra , Dhany, Rambli, Dayang R.A., Foong, Oi Mean

    Published 2008
    “…A comprehensive performance study has been reported that PrefixSpan, one of the sequential pattern mining algorithms, outperforms GSP, SPADE, as well as FreeSpan in most cases, and PrefixSpan integrated with pseudoprojection technique is the fastest among those tested algorithms. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Genetic algorithm based mass distribution optimization of quadruped leg robot for walking performance enhancement by Loo, Shing Yan

    Published 2013
    “…Genetic algorithm is used to search for the optimal mass distribution that carried out the farthest walking distance on various terrains. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    A comparative review on symmetric and asymmetric dna-based cryptography by Hammad B.T., Sagheer A.M., Ahmed I.T., Jamil N.

    Published 2023
    “…Current researchers have focused on DNA-based cryptography, in fact, DNA or deoxyribonucleic acid, has been applied in cryptography for performing computation as well as storing and transmitting information. In the present work, we made use of DNA in cryptographic, i.e. its storing capabilities (superior information density) and parallelism, in order to improve other classical cryptographic algorithms. …”
    Article
  18. 18

    An ensemble data summarization approach based on feature transformation to learning relational data by Chung, Seng Kheau

    Published 2015
    “…The Information Gain borrowed from Information Retrieval theory and Term-term Correlation algorithm are used to determine the relevancy of these features to be selected or merged in order to form a new generation of TF-IDF vector space. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Optimized feature construction methods for data summarizations of relational data by Sze, Florence Sia Fui

    Published 2014
    “…Dynamic Aggregation of Relational Attributes (DARA) algorithm is one of the approaches to summarize data stored in a target table that has a one-to-many relationship with data stored in a non-target table. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen by Shawkat S.A., Tuama B.A., Al-Barazanchi I.

    Published 2023
    “…In this paper, a comparative study is done between the two security algorithms on a cloud platform called eyeOS. …”
    Article