Search Results - (( using three data algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- data algorithm »
- three data »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The experiment contains two phases; first phase was conducted against java applications that do not use any protection to determine the ability of reversing tools to read the compiled code. …”
Get full text
Get full text
Thesis -
2
An extended ID3 decision tree algorithm for spatial data
Published 2011“…As in the ID3 algorithm that use information gain in the attribute selection, the proposed algorithm uses the spatial information gain to choose the best splitting layer from a set of explanatory layers. …”
Get full text
Get full text
Conference or Workshop Item -
3
Classification of breast cancer disease using bagging fuzzy-id3 algorithm based on fuzzydbd
Published 2022“…There are various decision tree algorithms, but the most commonly used are Iterative Dichotomiser 3 (ID3), CART, and C4.5. …”
Get full text
Get full text
Thesis -
4
Attribute related methods for improvement of ID3 Algorithm in classification of data: A review
Published 2020“…There are several learning algorithms to implement the decision tree but the most commonly-used is ID3 algorithm. …”
Get full text
Get full text
Get full text
Article -
5
The multiple outliers detection for circular univariate data using different agglomerative clustering algorithms
Published 2024“…Three circular similarity measures are used to obtain the dendrogram from three agglomerative clustering algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Enhancing Classification Algorithms with Metaheuristic Technique
Published 2024“…In its operation, the metaheuristic algorithm optimizes the feature selection process,which will later be processed using the classification algorithm.Three (3) meta-heuristics were implemented, namely Genetic Algorithm, Particle Swarm Optimization, and Cuckoo Search Algorithm; the experiment was conducted, and the results were collected and analyzed. …”
Get full text
Get full text
Get full text
Article -
7
Image encryption and decryption using 3D-AES block cipher algorithm / Engku Maryam Syahdina Engku Safruddin
Published 2018“…In order to ensure the image data is secure/ protected and encryption time is low, it is very timely to conduct a research on image encryption and decryption using 3D-AES block cipher algorithm. …”
Get full text
Get full text
Thesis -
8
Breast cancer disease classification using fuzzy-ID3 algorithm with FUZZYDBD method: automatic fuzzy database definition
Published 2021“…FUZZYDBD method, an automatic fuzzy database definition method, would be used to design the fuzzy database for fuzzification of data in the FID3 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Audio encryption and decryption using 3D AES block cipher algorithm / Nur Fattin Nadhrah Saifuddin
Published 2018“…This project purpose is to identify the implementation testing security using 3D AES block cipher algorithm. Besides, this encryption using audio as a data in order to design and develop the project. …”
Get full text
Get full text
Thesis -
10
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…The prototype of SEM is constructed based on the modern Smart Meter design and modified with additional control devices and sensors, so that it can measure, record and transfer the data using designated algorithm combining three types of communication system in one device; Wi-Fi, GSM and RF. …”
Get full text
Get full text
Thesis -
11
Three-term backpropagation algorithm for classification problem
Published 2006“…These datasets represents small, medium and large scale data respectively. The results obtained showed that Three-Term BP only outperforms standard BP while using small scale data but not in case of medium and large dataset. …”
Get full text
Get full text
Thesis -
12
Improvement DACS3 Searching Performance using Local Search
Published 2009“…Several versions of metaheuristic ACOs’ have been developed through several improvement processes to produce better algorithm. Past research has proposed a Dynamic Ant Colony System with Three Level Updates (DACS3) algorithm that embedding a Malaysian House Red Ant behavior into current ACS. …”
Get full text
Get full text
Conference or Workshop Item -
13
The effect of different similarity distance measures in detecting outliers using single-linkage clustering algorithm for univariate circular biological data
“…Clustering algorithms can be used to create an outlier detection procedure in univariate circular data. …”
Get full text
Get full text
Get full text
Article -
14
Classification model for hotspot occurrences using spatial decision tree algorithm
Published 2013“…As the ID3 algorithm that uses information gain in the attribute selection, the proposed algorithm uses spatial information gain to choose the best splitting layer from a set of explanatory layers. …”
Get full text
Get full text
Get full text
Article -
15
Evaluating power efficient algorithms for efficiency and carbon emissions in cloud data centers: a review
Published 2015“…The three algorithms are evaluated for performance using three parameters; power efficiency, cost effectiveness, and amount of CO2 emissions. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
16
An improved ACS algorithm for data clustering
Published 2020Get full text
Get full text
Get full text
Article -
17
Replica Creation Algorithm for Data Grids
Published 2012“…The new Data Replica Creation Algorithm (DRCM) improves performance of data grid systems by reducing job execution time and making the best use of data grid resources (network bandwidth and storage space). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Data depublication using : Hashing algorithm / Naimah Nayan
Published 2019“…The objective of this project is to compare MD5 & SHA-1 algorithm in data deduplication technique and to evaluate the MD5 & SHA-1 algorithm, length of message digest and speed using deduplication software. …”
Get full text
Get full text
Thesis -
19
Development of obstable avoidance system for 3D robot navigation
Published 2024“…In conclusion, the developed algorithm enables the robot to detect obstacles that are not on the same plane as the 2D LiDAR and cannot be detected using depth camera data.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
Get full text
Get full text
Thesis
