Search Results - (( programming using al algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- data normalization »
- al algorithm »
- using al »
- java »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
3
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
4
-
5
-
6
Intelligent examination timetabling system using hybrid intelligent water drops algorithm
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Computer algorithm for playing checkers
Published 2023“…The Checkers game is programmed using Visual C++. Two players can play the game or against the computer The Al algorithm will select the best path to win when playing against the human. …”
text::Thesis -
8
Dam haji game using A* search algorithm / Siti Farah Najwa Mukhlis
Published 2017Get full text
Get full text
Thesis -
9
Green inventory routing problem using hybrid genetic algorithm / Huda Zuhrah Ab Halim ... [et al.]
Published 2021“…The mixed-integer linear programming of this problem is adopted from Cheng et al. wherein this study a different Hybrid Genetic Algorithm is proposed at mutation operator. …”
Get full text
Get full text
Get full text
Article -
10
Intelligent Examination Timetabling System Using Hybrid Intelligent Water Drops Algorithm
Published 2024Proceedings Paper -
11
-
12
-
13
-
14
Security analysis of blowfish algorithm
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
15
-
16
-
17
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
18
-
19
-
20
Retrieving translated Al-Quran documents using edit distance technique / Ahmad Syukri Mohamad Zaid
Published 2001“…The method has been implemented as a C programming language. The Wagner and Fischer is used to retrieve documents from the translated Al-Quran. …”
Get full text
Get full text
Thesis
