Search Results - (( using combination using algorithm ) OR ( java application modified algorithm ))
Search alternatives:
- application modified »
- combination using »
- java application »
- using algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
3
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
4
Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms
Published 2005“…In cluster generating process, the developed BBSI algorithm was used to select the best band combination for generating cluster by using Iterative self- Organizing Data Analysis (ISODATA) technique. …”
Get full text
Get full text
Thesis -
5
To study the performance of stemming algorithm on Malay words beginning with the letter "S" / Rohana Jantan
Published 2000“…This algorithm is used in the Malay language document that is used is the Quran translated document. …”
Get full text
Get full text
Thesis -
6
An Experimental Study Of Combinational Logic Circuit Minimization Using Firefly Algorithm
Published 2014“…Combinatorial logic circuit minimization is usualy done using Karnaugh’s Map or Bolean equation. This paper presents an aplication of Firefly Algorithm to design combinational logic circuit in which the objective function is to minimize the total number of gates used. …”
Get full text
Get full text
Article -
7
Study of stemming algorithm for Malay words which begin with alphabets 'M' / Mohd Zawawi Mohd Yunus
Published 2000“…These stemming algorithm problems will be solved by doing five experiments such as analysis the existing algorithm, do correction in the file, adding rules, correct the stemming algorithm and use two combination rules. …”
Get full text
Get full text
Thesis -
8
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…The proposed approach uses a frequency domain combinational framework of coefficients scrambling with Key Scheduling Algorithm based (KSA-based) permutation. …”
Get full text
Get full text
Thesis -
9
To improve stemming algorithm on Malay words begin with alphabet B / Norasiah Ismail
Published 2001“…This involves the use of two combinations simultaneously such as the pair combination of prefix-suffix-prefix suffix-infix as primary combinations and prefix suffix-suffix-prefix-infix as the secondary. …”
Get full text
Get full text
Thesis -
10
The study of stemming algorithm for Malay words that start with the letter 'B' from translated Quran documents / Azriana Ahmad
Published 1999“…The performance of this Malay stemming algorithm is tested using translated Quran documents and Malay dictionary. …”
Get full text
Get full text
Thesis -
11
Ensemble Dual Recursive Learning Algorithms for Identifying Custom Tanks Flow with Leakage
Published 2010“…For this purpose, three models is developed, first using recursive least square algorithm (RLS), second using recursive instrument variable (RIV) algorithm and lastly using combination of this two algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
12
Ensemble dual recursive learning algorithms for identifying flow with leakage
Published 2010“…For this purpose, three models is developed, first using recursive least square algorithm (RLS), second using recursive instrument variable (RIV) algorithm and lastly using combination of this two algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
13
Shape-based recognition using combined Jaccard and Mahalanobis measurement / Noor Aznimah Abdul Aziz
Published 2013“…Therefore, we proposed a shape recognition algorithm using similarity measurement combining Jaccard and Mahalanobis distance is used to measure the similarity between geometry shape sketches. …”
Get full text
Get full text
Thesis -
14
Committee neural networks with fuzzy genetic algorithm.
Published 2011“…There are different ways of combining the intelligent systems' outputs in the combiner in the committee neural network, such as simple averaging, gating network, stacking, support vector machine, and genetic algorithm. …”
Get full text
Get full text
Get full text
Article -
15
-
16
To enhance existing Malay stemming algorithm starting with the letter 'D' / Mohd Nazril Hafez Mohd Supandi
Published 2000“…In which it involves the use of two combinations simultaneously such as the pair combination of 1234 as primary combination and 2341 as the secondary. …”
Get full text
Get full text
Thesis -
17
-
18
The study of stemming algorithm on Malay words that begin with alphabets P, Q, Y, and Z from the translated Al-Quran / Suriani Mat
Published 2001“…This involves the use of two combinations simultaneously such as the pair combination of 1234 as primary combinations and 3124 as the secondary. …”
Get full text
Get full text
Thesis -
19
A comparative study on testing optimization techniques with combinatorial interaction testing for optimizing software product line testing
Published 2025“…An experiment has been conducted on the most commonly used optimization algorithms in previous studies. …”
Get full text
Get full text
Get full text
Article -
20
Predictive-reactive job shop scheduling for flexible production systems with the combination of optimization and simulation based algorithm
Published 2020“…The predictive part determines the feasible schedule to be used for a flow shop which is generated using a combination of rule-based simulation and optimization: first, using the optimization algorithm to compute a rough plan, followed by using a rule based simulation system to locally fine tune the plan to obtain the final schedule. …”
Get full text
Get full text
Get full text
Article
