Search Results - (( program evaluation machine algorithm ) OR ( java implementation _ algorithm ))

Refine Results
  1. 1

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  5. 5

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  6. 6

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…One of the problems addressed by machine learning is data classification. Finding a good classification algorithm is an important component of many data mining projects. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
    Get full text
    Get full text
    Get full text
    Book
  12. 12

    Genetic programming based machine learning in classifying public-private partnerships investor intention / Ahmad Amin ... [et al.] by Amin, Ahmad, Rahmawaty, Rahmawaty, Lautania, Maya Febrianty, Abdul Rahman, Rahayu

    Published 2023
    “…The PPP data was analyzed in this study using two machine learning approaches, Genetic Programming and conventional machine learning, with testing results showing that all machine learning algorithms from both approaches achieved high accuracy rates of over 80%, with the Genetic Programming machine learning outperformed the conventional approach. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem by Mohd Pozi, Muhammad Syafiq

    Published 2016
    “…The proposed classifier is called Support Vector Genetic Programming Machine, SVGPM. In order to evaluate the performance of SVGPM against current methods in solving imbalanced classification task, three experiments are conducted such as on selected standard class imbalanced benchmark data sets, intrusion detection system (IDS) data set and remote sensing data set. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Evaluation of data mining classification and clustering techniques for diabetes / Tuba Pala and Ali Yilmaz Camurcu by Pala, Tuba, Camurcu, Ali Yilmaz

    Published 2014
    “…The success evaluation of data mining classification algorithms have been realized through the data mining programs Weka and RapidMiner. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Machine learning predictions of stock market pattern using Econophysics approach by Roslan, Nur Nadia Hani, Abdullah, Shahino Mah

    Published 2025
    “…There are various techniques for identifying and observing the stock market patterns, one of the techniques is to use Python programming to evaluate and possibly forecast stock market behaviour through predictive modelling, combining both machine learning and Econophysics insights. …”
    Get full text
    Get full text
    Book Section
  18. 18

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Evaluation of the accuracy of soft computing learning algorithms in performance prediction of tidal turbine by Band, S.S., Taherei Ghazvinei, P., bin Wan Yusof, K., Hossein Ahmadi, M., Nabipour, N., Chau, K.-W.

    Published 2021
    “…Therefore, the current paper concentrated on reducing the cost of transportation and installation of the turbine by performing a model. Extreme Learning Machine and Support Vector Machines as well as Genetic Programming were applied to predict the performance of the turbine model by creating short-term, multistep-ahead prediction models to compute the performance of the H-rotor vertical axis Folding Tidal turbine. …”
    Get full text
    Get full text
    Article