Search Results - (( post implementation new algorithm ) OR ( java data normalization algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Even a normal people using clustering to grouping their data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Crosssover-first different evolution: a comprehensive post- Hoc analysis by Jason Teo

    Published 2017
    “…Implementation details explained clearly with a comprehensive post-hoc statistical analysis to support the algorithm. …”
    Get full text
    Get full text
    Book
  3. 3

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A Survey of metaheuristic approaches for curriculum based course timetabling problem by Wahid, Juliana, Mohd Hussin, Naimah

    Published 2017
    “…Sometimes the depth of information tend to be reduced as both version need to be highlighted at the same place.This can leads to confusing of references in implementation of new approach in terms of features that each versions support. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A new countermeasure to combat the embedding-based attacks on the goldreich-goldwasser-halevi lattice-based cryptosystem by Arif Mandangan, Nazreen Syazwina Nazaruddin, Muhammad Asyraf Asbullah, Hailiza Kamarulhaili, Che Haziqah Che Hussin, Babarinsa Olayiwola

    Published 2024
    “…Consequently, the simplified CVP can be reduced to a Shortest-Vector Problem (SVP) variant which can be solved by using lattice-reduction algorithms such as the LLL algorithm in a shorter amount of time. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A new countermeasure to combat the embedding-based attacks on the Goldreich-Goldwasser-Halevi lattice-based cryptosystem by Mandangan, Arif, Nazaruddin, Nazreen Syazwina, Asbullah, Muhammad Asyraf, Kamarulhaili, Hailiza, Che Hussin, Che Haziqah, Olayiwola, Babarinsa

    Published 2024
    “…Consequently, the simplified CVP can be reduced to a Shortest-Vector Problem (SVP) variant which can be solved by using lattice-reduction algorithms such as the LLL algorithm in a shorter amount of time. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Restaurant review system with data visualization and text search using TF-IDF algorithm / Syazwina Abd Hamid by Abd Hamid, Syazwina

    Published 2020
    “…Various features are deliver from this system such as login, logout, sign up as member, post new review, view submitted review or even delete reviews, search of restaurant, view restaurants, read reviews of restaurant and lastly, view overall analysis for insights where top 10 restaurants are ranked based on its average rating and total number of review. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Optimisation of energy efficient Assembly Sequence Planning using Moth-Flame Optimisation alghorithm by Muhammad Arif, Abdullah

    Published 2019
    “…On the other hand, the recent ASP research tends to explore the potential of a relatively new algorithm to optimise ASP. Therefore, the aim of this research is to establish a methodology and implement the relatively new algorithm to optimise the Energy Efficient Assembly Sequence Planning (EE-ASP) problem. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Design of a high-speed, reconfigurable digital rank order filter by Toscano, George John, Saha, Pran Kanai, Alam, A. H. M. Zahirul

    Published 2009
    “…A bit-level algorithm by Kar and Pradhan has been modified in this work to implement the proposed ROF. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    User interface and interactivity design guidelines of algorithm visualization on mobile platform by Supli, Ahmad Affandi

    Published 2019
    “…Previous studies show that AV mobile study is still limited. AV implementation on the mobile platform is still considered as a new trend which started in 2013. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Detection and analysis of fake reviews on online service portal by Liong, Yong Xuan

    Published 2022
    “…In this paper, a framework of a Machine Learning based fake review detection model has been proposed to identify which classification algorithm is the most effective with the proposed framework.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Code-Based Signature Schemes For Online Voting System Based On The Blockchain Technology by Lee, Feng Wei

    Published 2022
    “…Post-quantum cryptography has been one of the focuses of researchers since the initiation of quantum algorithms. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    A Novel Approach to Estimate Diffuse Attenuation Coefficients for QuickBird Satellite Images: A Case Study at Kish Island, the Persian Gulf. by Pradhan, Biswajeet, Mohd Shafri, Helmi Zulhaidi, Mansor, Shattri, Kabiri, Keivan, Samim-Namin, Kaveh

    Published 2013
    “…Eventually, the maximum likelihood classifier was implemented during pre and post correction steps to examine the capability of the proposed approach. …”
    Get full text
    Get full text
    Article
  19. 19

    Development of mesoscopic imaging system for surface inspection / Moe Win by Moe , Win

    Published 2018
    “…For the automatic inspection, defect detection algorithms based on image thresholding are developed and implemented as a statistical approach to identify possible defects. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    The classification of wink-based eeg signals by means of transfer learning models by Jothi Letchumy, Mahendra Kumar

    Published 2021
    “…The implementation of pre-processing algorithms has been demonstrated to be able to mitigate the signal noises that arises from the winking signals without the need for the use signal filtering algorithms. …”
    Get full text
    Get full text
    Thesis