Search Results - (( knowledge implication based algorithm ) OR ( java application during algorithm ))
Search alternatives:
- knowledge implication »
- application during »
- implication based »
- java application »
- during algorithm »
-
1
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
2
Agreement options for negotiation on material location decision of housing development
Published 2020“…Social implications: The satisficing algorithm of the coalition will satisfy all stakeholders. …”
Get full text
Get full text
Article -
3
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
4
Rabbit breed classification using CNN / Aishah Nabila Mohd Zaid
Published 2024“…This project aims to study the CNN algorithm's efficacy in rabbit breed classification, develop a CNN-based prototype, and evaluate its accuracy. …”
Get full text
Get full text
Thesis -
5
Organizational Culture Automated Audit System (OCAAS)
Published 2017“…The study suggests the development of data mining based on knowledge management technology that can be utilized in automated OCA to overcome the many drawbacks. …”
Get full text
Get full text
Get full text
Thesis -
6
Determinants to knowledge transfer and sharing in multimedia super corridor in Malaysia : the mediating role of trust
Published 2016“…Based on knowledge creation theory, this study examines the determinants of knowledge transfer and sharing in MSC status organizations in Malaysia. …”
Get full text
Get full text
Get full text
Thesis -
7
Application of machine learning and artificial intelligence in detecting SQL injection attacks
Published 2024“…The main aim of this work is focusing on solving the IT-related challenge lack-of-adequate knowledge bases and tools for security practitioners to monitor and mitigate SQL Injection attacks with AI/ML techniques. …”
Get full text
Get full text
Get full text
Article -
8
Manufacturing process planning optimisation in reconfigurable multiple parts flow lines
Published 2008“…Design/methodology/approach: The genetic algorithm methodology implements a genetic algorithm that is augmented by application specific heuristics in order to guide the search for an optimal solution. …”
Get full text
Get full text
Get full text
Article -
9
Application Of Bibliometric Analysis on Root Growth Algorithm
Published 2024“…An article reviewed and analyzed bibliographic data on metaheuristics but is not specific on the topic of root growth algorithm. Therefore, this article presents a bibliometric analysis based on the topic of the root growth algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
KopiCulture: Unveiling Customer Loyalty in Malaysia's Coffee Market through Clustering Algorithms for Local Cafe Insights
Published 2024“…Through this analysis, we contribute to the expanding body of knowledge on customer loyalty in the context of the Malaysian coffee market and offer implications for coffee retailers seeking to thrive in this competitive environment.…”
Get full text
Get full text
Get full text
Get full text
Article -
11
-
12
-
13
-
14
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
15
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
16
Does organizational culture matter in the relationship between trust and SMEs performance
Published 2018“…Research limitations/implications – The study used perceptions of owner/managers and only small-scale industries. …”
Get full text
Get full text
Get full text
Article -
17
Risk assessment for safety and health algorithm for building construction in Oman
Published 2015“…Existing risk matrices are designed based on brainstorming sessions, which may make these matrices risky to use because such sessions are based mainly on experience and knowledge about the decision at hand. …”
Get full text
Get full text
Thesis -
18
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
-
20
Evaluation and optimization of frequent, closed and maximal association rule based classification
Published 2014“…On the other hand maximal itemset based association rules, that are a subset of closed itemset based rules, show to be insufficient in this regard, and typically will have worse recall and generalization power. …”
Get full text
Get full text
Article
