Search Results - (( java information based algorithm ) OR ( basic computer usage algorithm ))
Search alternatives:
- information based »
- java information »
- usage algorithm »
- basic computer »
- computer usage »
-
1
RSA Encryption & Decryption using JAVA
Published 2006Get full text
Get full text
Final Year Project -
2
Web usage mining for UUM learning care using association rules
Published 2004Get full text
Get full text
Thesis -
3
-
4
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
5
A genetic similarity algorithm for searching the Gene Ontology terms and annotating anonymous protein sequences
Published 2008“…The semantic similarity measure algorithm is used to compute the similitude strength between the Gene Ontology terms. …”
Get full text
Get full text
Get full text
Article -
6
The development of semantic meta-database: an ontology based semantic integration of biological databases
Published 2007“…Therefore, a simple and practical computational method that is more accurate, faster, easy to configure and use, and bears low computing cost is needed particularly for offline usage. …”
Get full text
Get full text
Monograph -
7
Petri Net Algorithm for controlling and monitoring system
Published 2009Get full text
Working Paper -
8
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
9
-
10
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
12
-
13
-
14
Bridging Mayer’s cognitive theory of multimedia learning and computational thinking in tackling the cognitive load issues among young digital natives : a conceptual framework
Published 2022“…It is undeniable that a digital native must begin with at least a basic level of computer knowledge in order to manage their education and daily life. …”
Get full text
Get full text
Get full text
Article -
15
DESIGN AND IMPLEMENTATION OF RIPEMD-160 HASH FUNCTION USING VERILOG HDL
Published 2022“…Information security is now of the utmost importance since it aims to safeguard data that is valuable to individuals and companies thus a variety of encryption methods have been studied due to the numerous risks and vulnerabilities that computer networks have. Now, sensitive data can be safely transmitted via the network thanks to the Cryptography Algorithm's usage of encryption to safeguard data. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
16
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis -
17
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…Studies have shown how user perception can have a strong influence on policies and decision-making processes in a place, society, and nation. This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
18
Songs Search Using Human Humming Voice
Published 2007Get full text
Get full text
Final Year Project -
19
-
20
Mobile Vision-based Automatic Counting of Bacteria Colonies
Published 2017Get full text
Get full text
Get full text
Article
