Search Results - (( post implementation using algorithm ) OR ( java application means algorithm ))

Refine Results
  1. 1

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…The K-means algorithm has been around for over a century. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2
  3. 3

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
    Get full text
    Get full text
    Journal
  4. 4

    Crosssover-first different evolution: a comprehensive post- Hoc analysis by Jason Teo

    Published 2017
    “…Explore a new evolutionary optimization approach using Crossover-First Differential Evolution. Implementation details explained clearly with a comprehensive post-hoc statistical analysis to support the algorithm. …”
    Get full text
    Get full text
    Book
  5. 5

    Parallel Implementation Of Field Visualizations With High Order Tetrahedral Finite Elements by Ishak, Mohammad Hafifi Hafiz

    Published 2013
    “…The method builds upon an approach of the open source visualization software VTK where the data visualizer program ParaView is freely available. By using Red Partitioning of high order elements, the implemented algorithm successfully enables visualization of up to fourth order tetrahedra while using the same data structure for second order tetrahedra as available in ParaView. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Power system network splitting and load frequency control optimization using ABC based algorithms / Kanendra Naidu a/l Vijyakumar by Vijyakumar, Kanendra Naidu

    Published 2015
    “…This research presents a modified optimization program for the system splitting problem in large scale power system based on Artificial Bee Colony algorithm and graph theory. The post-islanding frequency stability is maintained by optimizing the Load Frequency Control‘s parameters. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Biometrics electronic purse by Abdul Rahman, Abdul Wahab, Eng, Chong Tan, S., M. Heng

    Published 1999
    “…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12
  13. 13

    Development of an Automated Technique for Reconstructing Jawi Characters in Historical Documents by Zulcaffle, Tengku Mohd Afendi

    Published 2007
    “…The algorithms have been implemented using Matlab software version 6.5. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Development of obstacle avoidance technique in web-based geographic information system for traffic management using open source software by Nik Yusoff, Nik Mohd Ramli, Mohd Shafri, Helmi Zulhaidi, Muniandy, Ratnasamy, Mohammad Wali, Islam

    Published 2014
    “…The shortest path routing is one of the well-known network analysis techniques implemented in road management systems. Pg Routing as an extension of Postgre SQL/Post GIS database is an open source library that implements the Dijkstra shortest path algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18
  19. 19

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis