Search Results - (( using a ((method algorithm) OR (search algorithm)) ) OR ( java application based algorithm ))
Search alternatives:
- application based »
- method algorithm »
- java application »
- using a »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Secondly, an expert system using Java programming technology with two tiers of search engine was developed to perform a fast selection of candidate materials in huge volume. …”
Get full text
Get full text
Thesis -
3
Songs Search Using Human Humming Voice
Published 2007Get full text
Get full text
Final Year Project -
4
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Message based random variable length key encryption algorithm.
Published 2009“…Value of random number should be greater than 35 bits and plaintext must be at least 7 bits. A padding algorithm was used for small size messages or big random numbers. …”
Get full text
Get full text
Article -
6
Simulation Of Path Optimisation Algorithms
Published 2017“…Thus, in this final year project, the optimum algorithm to use is A* algorithm with Bidirectional Searching method and Replanning method included during the searching process. …”
Get full text
Get full text
Monograph -
7
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
9
-
10
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
Published 2022“…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
Get full text
Get full text
Thesis -
11
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The proposed method uses a rank accuracy estimation model to decide the rank-1 value to be applied for the decomposition. …”
Get full text
Get full text
Article -
12
Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions
Published 2018“…Firstly, a new strategy based on a combined method (i.e. single-objective Gravitational Search (GSA) with Bat Algorithm (BAT) (SOGS-BAT)) algorithm is proposed in which relies on the closed interval between 0 and 1 to avoid falling into local search. …”
Get full text
Get full text
Thesis -
13
An experimental study of modified black hole algorithms
Published 2018“…The black hole has been found theoretically in the studies of the universe as a star having massive mass and gravity. The BH algorithm is a population-based method which uses more than one agent to find a solution in a search space. …”
Get full text
Get full text
Get full text
Thesis -
14
Comparative analysis of line search methods in the Steepest Descent algorithm for unconstrained optimization problems / Ahmad Zikri Shukeri, Puteri Qurratu Ain Megat Sulzamzamendi...
Published 2024“…The result from this study is choosing FMRI algorithm using exact line search to get faster convergence rate which means that the algorithm achieves a high level of accuracy in fewer iterations compared to using other algorithms and inexact line search.…”
Get full text
Get full text
Student Project -
15
String matching algorithms: to search and compare longest common subsequence strings retrieved from Wagner & Fischer and Hirschberg algorithms on Malay dictionary words / Mohd Razi...
Published 1999“…This thesis studies the method of a string searching algorithm. There are two methods being evaluated in this research. …”
Get full text
Get full text
Thesis -
16
Edge Detection Algorithm For Image Processing Of Search And Rescue Robot
Published 2016“…This project entitled “ Edge Detection Algorithm for Image Processing of Search and Rescue Robot ” has its primary purpose to identify an optimum edge detection algorithm for image processing of search and rescue robot. …”
Get full text
Get full text
Final Year Project -
17
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Optimal search algorithm in a big database using interpolation–extrapolation method
Published 2019“…Hence, the proposed IES method provides a faster search for items in a big database.…”
Get full text
Get full text
Get full text
Article -
19
Extended Bat Algorithm (EBA) as an improved searching optimization algorithm
Published 2018“…This paper presents a new searching technique by using a new variant of Bat Algorithm (BA) known as Extended Bat Algorithm (EBA). …”
Get full text
Get full text
Get full text
Get full text
Get full text
Book Chapter -
20
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…This research was undertaken to develop methods to mitigate shoulder-surfing attack. Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis
