Search Results - (( processes specifications using algorithm ) OR ( java application means algorithm ))
Search alternatives:
- processes specifications »
- specifications using »
- application means »
- java application »
- using algorithm »
- means algorithm »
-
1
A web-based implementation of k-means algorithms
Published 2022“…The K-means algorithm has been around for over a century. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
-
3
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
Get full text
Get full text
Journal -
4
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
5
Biometrics electronic purse
Published 1999“…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
7
Overview of metaheuristic: classification of population and trajectory
Published 2010“…An algorithm that applies a metaheuristic method is used when there are no specific methods to find a solution. …”
Get full text
Get full text
Monograph -
8
-
9
PID tuning control strategy using Cuckoo search algorithm for pressure plant
Published 2017“…Therefore, tuning of the controller for the specific process is necessary and each controller is process specific. …”
Get full text
Get full text
Article -
10
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis -
11
Mining Sequential Patterns Using I-PrefixSpan
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Manufacturing process planning optimisation in reconfigurable multiple parts flow lines
Published 2008“…Two modified genetic algorithms are devised and employed to provide the best approximate process planning solution. …”
Get full text
Get full text
Get full text
Article -
13
SURE-Autometrics algorithm for model selection in multiple equations
Published 2016“…The SURE-Autometrics is also validated using two sets of real data by comparing the forecast error measures with five model selection algorithms and three non-algorithm procedures. …”
Get full text
Get full text
Get full text
Thesis -
14
Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman
Published 2017“…In the exploration process, the algorithm will search for a population of house that matches with home buyers’ financial availability. …”
Get full text
Get full text
Thesis -
15
Genetic algorithm based for optimizing filter design / Rohana Awang Ahmed
Published 2000“…The conventional filter design technique is adapted in writing a MATLAB program using the Signal Processing Toolbox. GA is then implemented using the Genetic Algorithm Toolbox (GAOT). …”
Get full text
Get full text
Thesis -
16
Text messaging encryption system
Published 2012Get full text
Get full text
Undergraduates Project Papers -
17
Linear-PSO with binary search algorithm for DNA Motif Discovery / Hazaruddin Harun
Published 2015“…In the field of bioinformatics, a pattern is also known as a motif. Numerous algorithms had been developed for MD, but most of these were not designed to discover species specific motifs used in identifying a specifically selected species where the exact location of these motifs also needs to be identified. …”
Get full text
Get full text
Book Section -
18
Automatic generic process migration system in linux
Published 2012“…A fexible interface to the underlying checkpoint/ restart subsystem is designed which permits users to specify the migration mechanism according to process constraints. A migration algorithm is designed which attempts to exploit the unique features of the basic migration algorithms to form a generic algorithm. …”
Get full text
Get full text
Thesis -
19
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
