Search Results - (( post implementation developing algorithm ) OR ( java application modified algorithm ))
Search alternatives:
- implementation developing »
- application modified »
- post implementation »
- java application »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Parallel Implementation Of Field Visualizations With High Order Tetrahedral Finite Elements
Published 2013“…The developed algorithm was assessed on various problem geometries with considerable high number of unknowns where it is found that the approach is quite scalable.…”
Get full text
Get full text
Thesis -
3
Development of an Automated Technique for Reconstructing Jawi Characters in Historical Documents
Published 2007“…The model was developed based on several predefined criteria. The algorithms have been implemented using Matlab software version 6.5. …”
Get full text
Get full text
Thesis -
4
Development of obstacle avoidance technique in web-based geographic information system for traffic management using open source software
Published 2014“…The shortest path routing is one of the well-known network analysis techniques implemented in road management systems. Pg Routing as an extension of Postgre SQL/Post GIS database is an open source library that implements the Dijkstra shortest path algorithm. …”
Get full text
Get full text
Get full text
Article -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
6
Application of artificial neural network for automatic contingency analysis in power security assessment / Ismail Musirin and Titik Khawa Abdul Rahman
Published 2006“…The ANN is developed in order to predict the post-outage severity index from a set of preoutage data set. …”
Get full text
Get full text
Get full text
Article -
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
8
The implementation of post-processing data thinning for multibeam echo sounding data
Published 2006Get full text
Get full text
Get full text
Conference or Workshop Item -
9
The effects of compiler optimizations in face recognition system
Published 2009Get full text
Article -
10
A novel hybrid classification model of genetic algorithms, modified k-Nearest Neighbor and developed backpropagation neural network
Published 2014“…The purpose is benefitting from the synergies obtained from combining these technologies for the development of classification models. Such a combination creates an opportunity to invest in the strength of each algorithm, and is an approach to make up for their deficiencies. …”
Get full text
Get full text
Get full text
Article -
11
Toward Quantum-Resilient PKI: A Systematic Literature Review of Post-Quantum Certificates Model
Published 2026journal::journal article -
12
User interface and interactivity design guidelines of algorithm visualization on mobile platform
Published 2019“…Algorithm Visualization (AV) is a pedagogical tool that can help learners to see the animation of the step-by-step process of an algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
A Survey of metaheuristic approaches for curriculum based course timetabling problem
Published 2017“…Purpose - The aim of this paper is to explore approaches applied for solving CBCTT by presenting features of implementation related to it.The idea is to prepare references structure for future implementation.There are numerous surveys related to approaches in University course timetabling problem (UCTP) (Babaei, Karimpour, & Hadidi, 2014; Nandhini & Kanmani, 2009).Usually surveys that carried out involved post enrollment course timetabling problem (PECTT) and curriculum-based course timetabling problem (CBCTT) together in one literature. …”
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak
Published 2021“…A classifier model is developed using Naive Bayes characteristics. A comparison between built-in Scikit Learn Naive Bayes algorithm, and the scratch Naive Bayes algorithm is used to measure its effectiveness in terms of accuracy. …”
Get full text
Get full text
Thesis -
16
Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y...
Published 2017“…Therefore, I-Kaz-kurtosis ratio is recommended and advised to be implemented as self-decision method for selecting the IMF through HHT analysis and intelligent leak detection system can be developed.…”
Get full text
Get full text
Article -
17
Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz)
Published 2017“…Therefore, I-Kaz-kurtosis ratio is recommended and advised to be implemented as self-decision method for selecting the IMF through HHT analysis and intelligent leak detection system can be developed.…”
Get full text
Get full text
Get full text
Article -
18
Development of Phasor Measurement Unit Based Fault Detection and Faulty Line Classification in Electrical Power System
Published 2019“…This study first focuses on modifying the PMU model for standard test systems in a MATLAB Simulink environment. This model implements Non-Recursive Phasor Estimation (NRPE) algorithm. …”
Get full text
Get full text
Thesis -
19
Improvement of Cepstrum Analysis for the Purpose to Detect Leak, Feature and Its Location in Water Distribution System based on Pressure Transient Analysis
Published 2017“…To extract this signal, many signal analysis methods were implemented by researchers such as cross-correlation, genetic algorithm, and wavelets transform. …”
Get full text
Get full text
Get full text
Article -
20
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis
