Search Results - (( programming its application algorithm ) OR ( java data normalization algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Even a normal people using clustering to grouping their data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Evaluation of dynamic programming among the existing stereo matching algorithms by Teo, Chee Huat, Nurulfajar, Abd Manap

    Published 2015
    “…The algorithm used on the dynamic programming is the global optimization which provides better process on stereo images like its accuracy and its computational efficiency compared to other existing stereo matching algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    Automatic marking system for programming subject by Chan, Jin Yee

    Published 2023
    “…This project is a web application designed for lecturer that teaching programming subject to automatically mark programming algorithm exercise. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari by Nazari, Khairul Nashran

    Published 2017
    “…AES is being used widely in many applications since it is known for its faster encryption and decryption process and its strength. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Structural Equation Modeling Algorithm and Its Application in Business Analytics by Sorooshian, Shahryar

    Published 2017
    “…Novelty of this article is in modified steps of SEM application in modeling strategies, also in its developed practical comprehensive SEM application flowchart This article is a roadmap for business advisors and those scholars trying to compute SEM for their decision making, complex modeling and data analysis programming, …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  12. 12
  13. 13

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…This thesis also provides an explanation about the advantages. functions, characteristics. the degree of complexity in A • algorithm and its implementation in real-world application. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Parallel matrix-multiplication algorithm on network of workstations by Md. Aminuddin, Rusdi, Abdullah, Rosni, Hassan, Suhaidi

    Published 2004
    “…In this paper, we introduce the concept of Network of Computers (NOW) or Cluster computing and present its advantages. We discuss matrix-multiplication algorithm and highlight one of the parallel matrix--multiplication algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    CSC752: Advanced Algorithm & Analysis / College of Computing, Informatics and Media by UiTM, College of Computing, Informatics and Media

    Published 2022
    “…The algorithm design techniques topics and applications include divide and conquer, greedy algorithms, dynamic programming, network flow, NP-complete, approximation and other advanced algorithms.…”
    Get full text
    Get full text
    Get full text
    Teaching Resource
  16. 16

    CSC752: Advanced Algorithm & Analysis / College of Computing, Informatics and Mathematics by UiTM, College of Computing, Informatics and Mathematics

    Published 2018
    “…The algorithm design techniques topics and applications include divide and conquer, greedy algorithms, dynamic programming, network flow, NP-complete, approximation and other advanced algorithms.…”
    Get full text
    Get full text
    Get full text
    Teaching Resource
  17. 17
  18. 18
  19. 19

    A review on the applications of PSO-based algorithm in demand side management: Challenges and opportunities by Sulaima, Mohamad Fani, Zaini, Farah Anishah, Wan Abdul Razak, Intan Azmira, Zulkafli, Nur Izyan, Mokhlis, Hazlie

    Published 2023
    “…Owing to its simplicity and consistent performance in fast convergence time, Particle Swarm Optimization (PSO) is widely used as a part of the swarm AI algorithm and has become a prominent technique in the optimization process to exploit the full benefit of the demand-side program. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20