Search Results - (( java information needs algorithm ) OR ( basic computing tree algorithm ))
Search alternatives:
- java information »
- needs algorithm »
- basic computing »
- computing tree »
- tree algorithm »
-
1
-
2
-
3
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
4
BMTutor research design: Malay sentence parse tree visualization
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Stereo matching algorithm using census transform and segment tree for depth estimation
Published 2023“…Fundamentally, the framework input is the stereo image which represents left and right images respectively. The proposed algorithm in this article has four steps in total, which starts with the matching cost computation using census transform, cost aggregation utilizes segment-tree, optimization using winner-takes-all (WTA) strategy, and post-processing stage uses weighted median filter. …”
Get full text
Get full text
Get full text
Article -
6
Zero skew clock routing for fast clock tree generation
Published 2008Get full text
Get full text
Get full text
Proceeding Paper -
7
Petri Net Algorithm for controlling and monitoring system
Published 2009Get full text
Working Paper -
8
-
9
Image Based Oil Palm Tree Crowns Detection
Published 2020Get full text
Get full text
Final Year Project Report / IMRAD -
10
Tree physiology optimization on SISO and MIMO PID control tuning
Published 2018“…© 2018 The Natural Computing Applications Forum…”
Get full text
Get full text
Article -
11
Tree physiology optimization on SISO and MIMO PID control tuning
Published 2018“…© 2018 The Natural Computing Applications Forum…”
Get full text
Get full text
Article -
12
Text messaging encryption system
Published 2012“…Text Messaging Encryption system is a text message encryption and decryption.Encryption is a process of masking a message so that it is unreadable.Encryption is important to avoid other people to read certain information. The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. …”
Get full text
Get full text
Undergraduates Project Papers -
13
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…Utilization of a solitary algorithm is not powerful for extra ordinary state security to information in cloud computing. …”
Get full text
Get full text
Get full text
Thesis -
14
Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks
Published 2015“…To generate, update and distribute the keys for secure communication over IEEE 802.16e, the MBS applies Multicast and Broadcast Rekeying Algorithm (MBRA) as a basic key management algorithm. …”
Get full text
Get full text
Thesis -
15
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…Advanced Encryption Standard algorithm is being used to encrypt the text messaging. …”
Get full text
Get full text
Student Project -
16
A proposed algorithm of random vector in measuring similarity for network topology of Bursa Malaysia
Published 2018“…Hence, to ease the calculation process and improve the computational efficiency of RV coefficient, an algorithm is proposed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Biometric identification with limited data set
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020“…PHPMyAdmin is used to store the dataset and also acts as a database for user information. The algorithm chosen was implemented using Java Programming language and was tested using Root Means Square Error (RMSE) formula.…”
Get full text
Get full text
Thesis -
19
AnkPlex: algorithmic structure for refinement of near-native ankyrin-protein docking
Published 2017“…Background: Computational analysis of protein-protein interaction provided the crucial information to increase the binding affinity without a change in basic conformation. …”
Get full text
Get full text
Article -
20
Mapreduce algorithm for weather dataset
Published 2017“…This original dataset is stored in Hadoop Distributed File System. Next, MapReduce Algorithm is developed using Java programming. The algorithm is tested using small and big dataset. …”
Get full text
Get full text
Thesis
