Search Results - (( using active process algorithm ) OR ( java application means algorithm ))
Search alternatives:
- process algorithm »
- application means »
- java application »
- means algorithm »
- active process »
- using active »
-
1
A web-based implementation of k-means algorithms
Published 2022“…The K-means algorithm has been around for over a century. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
-
3
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
Get full text
Get full text
Journal -
4
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
5
Biometrics electronic purse
Published 1999“…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
7
-
8
Clustering chemical data set using particle swarm optimization based algorithm
Published 2008“…The main difference between these two data sets is measured in terms of the similarities quantify of bioactivities between active compounds. The results are compared with Ward’s algorithm in terms of proportion actives percentage in active clusters are. …”
Get full text
Get full text
Get full text
Thesis -
9
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis -
10
Mining Sequential Patterns Using I-PrefixSpan
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Jogging activity recognition using k-NN algorithm
Published 2022“…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
Get full text
Get full text
Get full text
Academic Exercise -
12
Text messaging encryption system
Published 2012Get full text
Get full text
Undergraduates Project Papers -
13
Amplitude independent muscle activity detection algorithm of soft robotic glove system for hemiparesis stroke patients using single sEMG channel
Published 2020“…Many algorithms have been developed in the literature to detect muscle activities; however, most of these algorithms depend on amplitude features in the detection process. …”
Get full text
Get full text
Thesis -
14
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Image Analysis of Sludge Aggregates in Palm Oil Mill Effluent (POME)
Published 2015“…Palm oil mill effluent (POME) is a highly polluting material and activated sludge system is now commonly used for the process of purification of the wastewater. …”
Get full text
Get full text
Final Year Project -
16
A Hybrid Active Contour and Artificial Bee Colony Algorithm for Segmenting Mixed-Meal Food Images (S/O: 13239)
Published 2020“…Active contour (snake) segmentation is extensively used in image processing and analysis applications particularly for identifying object boundaries. …”
Get full text
Get full text
Monograph -
17
An amplitude independent muscle activity detection algorithm based on adaptive zero crossing technique and mean instantaneous frequency of the sEMG signal
Published 2017“…A new algorithm has been developed to detect the presence of muscle activities in weak and noisy sEMG signals. …”
Get full text
Get full text
Conference or Workshop Item -
18
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
19
Multivariable PID controller design tuning using bat algorithm for activated sludge process
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Enhancement of stemming process for malay illicit web content
Published 2012“…There are six (6) phases included in web filtering process. One of them is pre-processing phase. In this phase, there are three main activities included; HTML parsing, stemming, and stopping. …”
Get full text
Get full text
Thesis
