Search Results - (( using analytical parallel algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Voting algorithms for large scale fault-tolerant systems by Karimi, Abbas

    Published 2011
    “…To solve this problem and gain benefits of this algorithm, we employed parallel algorithm technique and by using optimal number of processors, we could propose optimal algorithms known as Parallel Average Voting and Parallel Weighted Average Voting which both have optimal time complexity and less calculation cost. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Parallel computation of maass cusp forms using mathematica by Chan, Kar Tim

    Published 2013
    “…Our parallel programme comprises of two important parts namely the pullback algorithm and also the Maass cusp form algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    The Parallel Fuzzy C-Median Clustering Algorithm Using Spark for the Big Data by Mallik, Moksud Alam, Zulkurnain, Nurul Fariza, Siddiqui, Sumrana, Sarkar, Rashel

    Published 2024
    “…Therefore, we develop a Parallel Fuzzy C-Median Clustering Algorithm Using Spark for Big Data that can handle large datasets while maintaining high accuracy and scalability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mapreduce algorithm for weather dataset by Khalid Adam, Ismail Hammad

    Published 2017
    “…This original dataset is stored in Hadoop Distributed File System. Next, MapReduce Algorithm is developed using Java programming. The algorithm is tested using small and big dataset. …”
    Get full text
    Get full text
    Thesis
  5. 5

    MapReduce algorithm for weather dataset by Majid, Mazlina A., Romli, Awanis, Ahmad, Noraziah, Hammad, Khalid Adam Ismail

    Published 2018
    “…This original dataset is stored in Hadoop Distributed File System. Next, MapReduce Algorithm is developed using Java programming. The algorithm is tested using small and big dataset. …”
    Get full text
    Get full text
    Research Report
  6. 6

    An Efficient Energy Aware Adaptive System-On-Chip Architecture For Real-Time Video Analytics by Ahmed, Hisham Ahmed Ali

    Published 2016
    “…Afterwards, an SoC for real-time video analytics is realized on Zynq using Harris corner detection algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Job Matching Mobile Application using Fuzzy Analytic Hierarchy Process (FAHP) / Mohammad Ashraf Jefrizin by Jefrizin, Mohammad Ashraf

    Published 2017
    “…Findings of this project is portrayed as conceptual framework that consists the structure of job matching mobile application using FAHP algorithm. Evaluation is conducted using accuracy test where the result of this application is compared to the manual method using a survey. …”
    Get full text
    Get full text
    Student Project
  9. 9

    Design and performance evaluation of parallel elliptic curve cryptosystem with GF(P) projective coordinates by Hussein Fayiz, Mohammad Al-Khatib

    Published 2012
    “…In addition to the current projective coordinates, projection form (X/Z2, Y/Z2) was proposed to be used for Edwards ECC. To improve performance even further, this work proposed using parallel hardware designs by utilizing the inherent parallelism in ECC computations. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Predictive modeling of condominium prices using a Particle Swarm Optimization-Random Forest approach / Che Wan Sufia Che Wan Samsudin by Che Wan Samsudin, Che Wan Sufia

    Published 2025
    “…The model is highly practical and easy to interpret, making it very suitable for real-world applications. The methods used in this simulation study will be summarized within a comprehensive report, along with the process used in evaluating the appropriateness of using search heuristics in tandem with parallel systems and prospective real-world applications. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Leveraging data lake architecture for predicting academic student performance by Abdul Rahim, Shameen Aina, Sidi, Fatimah, Affendey, Lilly Suriani, Ishak, Iskandar, Nurlankyzy, Appak Yessirkep

    Published 2024
    “…In addition to forecasting the student performance, appropriate machine learning algorithms such as Support Vector Classifier, Naive Bayes, and Decision Trees are used to build prediction models by using the data lake's scalability and parallel processing capabilities. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  13. 13

    Computational simulation for static and dynamic load of rectangular plate in elastic region for analysis of impact resilient structure. by Djojodihardjo, Harijono, Jamali, Hamed, Shokrani, Alireza, Mustapha, Faizal, Zahari, Rizal, Wiriadidjaja, Surjatin

    Published 2012
    “…The second objective is to utilize the computational algorithm for direct numerical simulation, and as a parallel scheme, commercial off-the shelf numerical code is utilized for parametric study, optimization and synthesis. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15
  16. 16
  17. 17

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20