Search Results - (( java information needs algorithm ) OR ( basic computing data algorithm ))
Search alternatives:
- java information »
- needs algorithm »
- basic computing »
- computing data »
- data algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Computer B will send the data to the BASIC Stamp and the BASIC Stamp will check their program. …”
Get full text
Get full text
Monograph -
3
Text messaging encryption system
Published 2012“…Text Messaging Encryption system is a text message encryption and decryption.Encryption is a process of masking a message so that it is unreadable.Encryption is important to avoid other people to read certain information. The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. …”
Get full text
Get full text
Undergraduates Project Papers -
4
CSC645 - Algorithm Analysis and Design / College of Computing, Informatics and Media
Published 2022“…This course focuses on both the design and analysis of algorithms. It provides students with basic knowledge and techniques required to design efficient algorithms and analyse their efficiency, as well as demonstrate the key relationships between problem solving, algorithm design, data structures, programs and algorithm analysis, and the effects of the choices. …”
Get full text
Get full text
Get full text
Teaching Resource -
5
CSC645: Algorithm Analysis and Design / College of Computing, Informatics and Mathematics
Published 2019“…This course focuses on both the design and analysis of algorithms. It provides students with basic knowledge and techniques required to design efficient algorithms and analyse their efficiency, as well as demonstrate the key relationships between problem solving, algorithm design, data structures, programs and algorithm analysis, and the effects of the choices. …”
Get full text
Get full text
Get full text
Teaching Resource -
6
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…Utilization of a solitary algorithm is not powerful for extra ordinary state security to information in cloud computing. …”
Get full text
Get full text
Get full text
Thesis -
7
CSC126 - Fundamentals of Algorithms and Computer Problem Solving / Faculty of Computer And Mathematical Sciences
Published 2023“…Students will be taught to solve problems involving the 5 basic algorithms of summation, average, counting, as well as determining the minimum and maximum values of a set of data. …”
Get full text
Get full text
Get full text
Teaching Resource -
8
Voting algorithms for large scale fault-tolerant systems
Published 2011“…By extracting various plots from different aspects, we demonstrated that, compared to the basic algorithm, our algorithm has higher reliability and availability as the quantity of the input data increases. …”
Get full text
Get full text
Thesis -
9
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000Get full text
Get full text
Thesis -
10
A network based fetal ECG monitoring algorithm
Published 2011“…The hardware data acquisition system acquires the mother’s AECG data by using a commercial ECG frontend microchip, called CARDIC and stores the data in a local computer terminal. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…Advanced Encryption Standard algorithm is being used to encrypt the text messaging. …”
Get full text
Get full text
Student Project -
13
Ant system with heuristics for capacitated vehicle routing problem
Published 2013“…The computational results suggest that the AS approach embedded with heuristic(s) outperforms the pure AS algorithm. …”
Get full text
Get full text
Thesis -
14
System identification using Extended Kalman Filter
Published 2017Get full text
Get full text
Student Project -
15
Modifying iEclat algorithm for infrequent patterns mining
Published 2018Get full text
Get full text
Conference or Workshop Item -
16
Modifying iEclat algo ithm for infrequent patterns mining
Published 2018Get full text
Get full text
Conference or Workshop Item -
17
Web usage mining for UUM learning care using association rules
Published 2004Get full text
Get full text
Thesis -
18
Medical diagnosis using data mining techniques / Shaiful Nizam Zamri
Published 2003Get full text
Get full text
Thesis -
19
-
20
Recursive Subspace Identification Algorithm Using The Propagator Based Method
Published 2017“…However, because of the SVD computational complexity that involved in the algorithm, the classical SMI algorithms are not suitable for online application. …”
Get full text
Get full text
Get full text
Article
