Search Results - (( using implementation some algorithm ) OR ( java implication bees algorithm ))

Refine Results
  1. 1

    Implementation of hybrid encryption method using caesar cipher algorithm by Tat Wi, Charomie

    Published 2010
    “…As a conclusion, Caesar cipher algorithm can be implemented in hybrid encryption project to make data secure and better.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Implementation of hybrid encryption method using caesar cipher algorithm by Charomie, Tat Wi

    Published 2010
    “…In daily life,we use Internet or accessing information from various sources.Some of the procedure requires us to sending our own information.The objective of this project is to explore the way of doing encryption,improve certain aspect of the existing algorithm and to find out a way to create better security.In this project,encryption will be implemented in information on a web that makes it hard to be readable and secure.For that matter,encryption method known as Caesar cipher,one of the simplest and most widely used encryption techniques.In this encryption,it uses the substitution cipher in which each letter in the plaintext is replaced by some fixed number of position down the alphabet. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Implementation of an autonomous mobile robot navigation algorithm using C language by Subra Mullisi, Shafeq Marwan

    Published 2009
    “…This report basically discusses the study and also work that has been done from previous of the chosen topic, which is Implementation of an Autonomous Mobile Robot Navigation Algorithm using 'C' language. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    VITILIGO LESION ASSESSMENT TOOL ON SMARTPHONE by BORETSKAYA, VIKTORIYA

    Published 2013
    “…ICA algorithm does vast computations thus; ICA algorithm is used to improve segmentation performance. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    A hybrid algorithm for finding shortest path in network routing. by Soltan Aghaei, Mohammad Reza, Ahmad Zulkarnain, Zuriati, Mamat, Ali, Zainuddin, Hishamuddin

    Published 2009
    “…This wave gives an O( N ) steps quantum algorithm for identifying that record, where was used classical Dijkstra’s algorithm for finding shortest path problem in the graph of network and implement quantum search. …”
    Get full text
    Article
  6. 6

    Outdoor marker-less tracking and pose calculating system for mobile augmented reality by Rehman, Ullah Khan

    Published 2014
    “…Some use moveable system using laptop and much extra sensing hardware which increase the cost, unnatural in use and difficult to maintain. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Attribute related methods for improvement of ID3 Algorithm in classification of data: A review by Nur Farahaina, Idris, Mohd Arfian, Ismail

    Published 2020
    “…There are several learning algorithms to implement the decision tree but the most commonly-used is ID3 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Amplitude independent muscle activity detection algorithm of soft robotic glove system for hemiparesis stroke patients using single sEMG channel by Hameed, Husamuldeen Khalid

    Published 2020
    “…In spite of some algorithms that have been developed in the literature to classify some hand motions by using single channel, the current implementation of soft robotic glove systems are still employing two channels for detecting the closing and opening movements of the hand, due to the intensive calculations required by these algorithms which impose difficulties on real time implementation. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Improving on the network lifetime of clustered-based wireless sensor network using modified leach algorithm by Zeni, Saltihie

    Published 2012
    “…This document is a study about LEACH algorithm where the implementation was done using OMNeT++ network simulator to study the performance of this algorithm in term of network lifetime. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Security analysis of blowfish algorithm by Alabaichi, Ashwak Mahmood, Ahmad, Faudziah, Mahmod, Ramlan

    Published 2013
    “…C++ is used in the implementation of the blowfish algorithm; MATLAB programming (Mathworks, R., 2012a) is used in the implementation of avalanche effect and correlation coefficient.…”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Quantum Processing Framework And Hybrid Algorithms For Routing Problems by Soltan Aghaei, Mohammad Reza

    Published 2010
    “…The focus of this study is developing a framework of QAPU and hybrid architecture for classical-quantum algorithms. The framework is used to increase the implementation performance of quantum algorithms. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Sentiment Analysis of Airline Reviews Using Naive Bayes Algorithm / Ahmad Firdaus Maliki by Maliki, Ahmad Firdaus

    Published 2021
    “…Even though technologies have evolved over the years, some companies such as airline companies still use traditional methods to collect reviews by using surveys which may lead to human error. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Enhanced Clustering Algorithms For Gray-Scale Image Segmentation by Siddiqui, Fasahat Ullah

    Published 2012
    “…The algorithms are chosen since they are easy to be implemented, required low computational time and less sensitive to noise and artifacts. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…In order to make the normal people can cluster their data easily, this project aims is to develop a web-based clustering tool that can be used by all peoples. This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Test Data Generation for Event Driven System Using Bees Algorithm by Mohammed Zabil, Mohd H., Kamal Z., Zamli

    Published 2013
    “…In this paper we discuss and proposed a new strategy for generating test data for event-driven system using a bio inspired artificial intelligent, namely Bees Algorithm (BA). …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…The steps to calculate a shortest path using A • algorithm is shown by using appropriate examples and related figures. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Three-term backpropagation algorithm for classification problem by Saman, Fadhlina Izzah

    Published 2006
    “…Standard Backpropagation Algorithm (BP) is a widely used algorithm in training Neural Network that is proven to be very successful in many diverse application. …”
    Get full text
    Get full text
    Thesis