Search Results - (( knowledge implementation level algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- knowledge implementation »
- customization algorithm »
- implementation level »
- java application »
- level algorithm »
-
1
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
2
-
3
Assessing the outcome of Competencies Level from Knowledge-Based Project
Published 2008Get full text
Get full text
Final Year Project -
4
An Artificial Intelligence-Based Knowledge Management System for Outcome-Based Education Implementing in Higher Education Institutions
Published 2025“…Recommendation system on learning analysis was implemented in a hybrid algorithm combines Rule-based and Content-based filtering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Process Planning Optimization In Reconfigurable Manufacturing Systems
Published 2008“…The five (5) AADTs include; a variant of the simulated annealing algorithm that implements heuristic knowledge at critical decision points, two (2) cooperative search schemes based on a “loose hybridization” of the Boltzmann Machine algorithm with (i) simulated annealing, and (ii) genetic algorithm search techniques, and two (2) modified genetic algorithms. …”
Get full text
Get full text
Thesis -
6
E4ML: Educational Tool for Machine Learning
Published 2003“…There are various types of machine learning algorithms with certain processes taken by the algorithm.In teaching of the machine learning algorithms, such processes need to be explained especially to the beginner in introductory level.This paper discusses the development the tool that addresses the process by certain algorithm to produce a hypothesis or output based on given data.This tool can also be used in teaching and learning purposes.The explanation of processes by the algorithms is demonstrated through simple simulation.The source of the algorithms was adapted from Mitchell book [1] that cover popular algorithms in machine learning for teaching and learning such as Concept Learning, Decision Tree, Bayesian Learning, Neural Networks, and Instance based Learning.The tool also used several classes of Weka (Waikato Environment for Knowledge Analysis) as a basis for the design and implementation of the new tool that focuses on explaining the processes taken by certain algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
8
Enhanced Instantaneous Power Theory with average algorithm for indirect current controlled three-level inverter-based shunt active power filter under dynamic state conditions
Published 2016“…As for its controller, PQ Theory has served the major role in harmonics extraction algorithm due to its simple implementation features. …”
Get full text
Get full text
Get full text
Article -
9
Datasets Size: Effect on Clustering Results
Published 2013“…This gives a wider acceptance to data mining, being an interdisciplinary field that implements algorithm on stored data with a view to discovering hidden knowledge. …”
Get full text
Get full text
Conference or Workshop Item -
10
Fuzzy expert system to evaluate programming question / Norfarhana Syamiza Amir Sham
Published 2017“…The examination questions will measure the understanding and knowledge level of students. However, there are differences in background among computer science diploma level students. …”
Get full text
Get full text
Thesis -
11
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…Thus, this thesis addresses these issues with the objective of intelligently divulging the knowledge hidden in the recorded event report at a relay device level using a data mining strategy based on Rough Set Theory, Genetic Algorithm and Rule Quality Measure under supervised learning within the framework of Knowledge Discovery in Database (KDD) in order to discover the relay’s decision algorithm (prediction rules) and, subsequently, the association rule. …”
Get full text
Get full text
Thesis -
12
Semantic analysis system by using latent semantic analysis (LSA) algorithm on khutbah texts / Ammar Zuber
Published 2019“…As nowadays, some muslims attend the Friday Prayers just to obey God instruction instead of willingly come to gain new knowledge. This is where the khutbah texts needs to have a certain level of quality and also new knowledge to ensure muslims does not go back home empty-handed. …”
Get full text
Get full text
Thesis -
13
New filtering framework for web personalization search / Anitawati Mohd Lokman and Aishah Ahmad
Published 2012“…The Filtering framework provides foundation in developing the algorithm for searching tools. This algorithm can be implemented in both website and search engine.…”
Get full text
Get full text
Research Reports -
14
Supervisory fuzzy learning control for underwater target tracking
Published 2009Get full text
Article -
15
Automated Model Generation Approach Using MATLAB
Published 2011“…Model generators can also be categorized into the black, grey or white box approaches, depending on the level of existing knowledge of the system’s structure and parameters. …”
Get full text
Get full text
Get full text
Book Section -
16
Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line
Published 2020“…The hybrid Wavelet Multiresolution Analysis and Machine learning algorithm (WMRA-ML) is used to extracts the useful hidden knowledge from decomposed one-cycle fault transient signals (voltage & current) from four Matlab/Simulink CIGRE models. …”
Get full text
Get full text
Thesis -
17
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah
Published 2022“…Next, it establishes the research problems by implementing various existing algorithms using comparative analysis. …”
Get full text
Get full text
Get full text
Thesis -
18
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks
Published 2022“…Next, it establishes the research problems by implementing various existing algorithms using comparative analysis. …”
Get full text
Get full text
Get full text
Thesis -
19
Statistical analysis, ciphertext only attack, improvement of generic quasigroup string transformation and dynamic string transformation
Published 2018“…Most of those string transformations have not been implemented properly neither do they have security analysis. …”
Get full text
Get full text
Article -
20
Effect Of The Number Of Tapping Bits Of The A5/1 Stream Cipher Towards Hardware Performance
Published 2024“…While numerous work on the modification of the conventional design of the A5/1 stream have been carried out, to the best of author’s knowledge, they are mainly tested in terms of the randomness (and hence security) level, whereas the practicality of the algorithm’s design in hardware is typically overlooked. …”
Get full text
Article
