Search Results - (( knowledge implementation real algorithm ) OR ( java application designing algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Image Based Congestion Detection Algorithms And Its Real Time Implementation by Khdiar, Ahmed Nidhal

    Published 2015
    “…Most of the current studies in image processing are not reliable for real implementation because they either lack accuracy or do not work in real time. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    Design and implementation of real data fast fourier transform processor on field programmable gates array by Ahmed, Mohammed Kassim

    Published 2015
    “…In order to calculate the DFT efficiently, various FFT algorithms and architectures have been presented. So far, different approaches of achieving FFT for real-valued inputs has been discussed and implemented. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Fuzzy modeling of brain tissues in Bayesian segmentation of brain MR images by Farzan, Ali, Ramli, Abdul Rahman, Mashohor, Syamsiah, Mahmud, Rozi

    Published 2010
    “…Results show that our algorithm performs well in comparison with the one implemented in SPM. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Comparative study of apriori-variant algorithms by Mutalib, Sofianita, Abdul Subar, Ammar Azri, Abdul Rahman, Shuzlina, Mohamed, Azlinah

    Published 2016
    “…Handling and processing this “big data” demand powerful data mining methods and analysis tools that can turn data into useful knowledge. One of data mining methods is frequent itemset mining that has been implemented in real world applications, such as identifying buying patterns in grocery and online customers’ behavior.Apriori is a classical algorithm in frequent itemset mining, that able to discover large number or itemset with a certain threshold value. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Real-time anomaly detection using clustering in big data technologies / Riyaz Ahamed Ariyaluran Habeeb by Riyaz Ahamed , Ariyaluran Habeeb

    Published 2019
    “…Based on the outcome of the analysis, this research proposed a novel framework namely real-time anomaly detection based on big data technologies (RTADBDT), along with supporting implementation algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
    Get full text
    Get full text
    Thesis
  14. 14

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Ontology-based metabolic pathway prediction using saccharomyces cerevisiae data from genbank, ecocyc and kegg by Zakaria, Yuslina

    Published 2006
    “…This proposed approach is implemented and tested using real data of Saccharomyces cerevisiae from GenBank and pathway reference databases from EcoCyc/MetaCyc and KEGG. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Improving Class Timetabling using Genetic Algorithm by Qutishat, Ahmed Mohammed Ali

    Published 2006
    “…We have targeted the research on class timetabling problem. Hence, Genetic Algorithm (GA) is used as one of the most popular optimization solutions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Green building valuation based on machine learning algorithms / Thuraiya Mohd ... [et al.] by Mohd, Thuraiya, Jamil, Syafiqah, Masrom, Suraya, Ab Rahim, Norbaya

    Published 2021
    “…Green building is known as a potential method to improve building performance efficiency. To our knowledge, there is still no implementation of machine learning models on green building valuation features for building price prediction compared to conventional building development. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar by Jaafar, Siti Aisyah

    Published 2021
    “…Thus, resulting in the efficiency of the novel AR-IoT remote monitoring algorithm. This research contributes to existing knowledge of AR-IoT onto the growing area of research scopes by exploring more usage of AR and IoT for remote manufacturing monitoring.…”
    Get full text
    Get full text
    Thesis
  20. 20

    Factor Strategy Model: Proofs of Prototype Concept for Software Quality Evaluation by Nathan, Darmawan, Ooi, Keng Boon, Chong, Alain Yee Loong, Tan, Boon In

    Published 2010
    “…This study aims to solve the problem for software developers or students having difficulty to identify the bad software design in their software product. Thus, by providing an algorithm analyzer to analyze the quality of design of the software product, developers or students can identify possible bad software design in their application.…”
    Get full text
    Get full text
    Article