Search Results - (( a constructive _ algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Multi-floor indoor location estimation system based on wireless local area network by Chua, Tien Han

    Published 2007
    “…The proliferation of high speed wireless technologies and mobile computing infrastructures has fostered a rapid development in location based services. …”
    Get full text
    Get full text
    Thesis
  2. 2

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  4. 4
  5. 5

    An Efficient Computational Algorithm for Solving Arbitrary Sylvester Matrix Equations in Fuzzy Control Theory (S/O 14179) by Ahmad, Nazihah, Ibrahim, Haslinda

    Published 2021
    “…With that, the constructed algorithm is considered as a new contribution to the application of control system theory…”
    Get full text
    Get full text
    Monograph
  6. 6

    Ant system-based feature set partitioning algorithm for classifier ensemble construction by Abdullah, , Ku-Mahamud, Ku Ruhana

    Published 2016
    “…All of these approaches attempt to generate diversity in the ensemble.However, classifier ensemble construction still remains a problem because there is no standard guideline in constructing a set of accurate and diverse classifiers. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A Hybrid of Ant Colony Optimization Algorithm and Simulated Annealing for Classification Rules by Rizauddin, Saian

    Published 2013
    “…The second proposed algorithm uses SA to optimize the terms selection while constructing a rule. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  10. 10

    Exploring a Q-learning-based chaotic naked mole rat algorithm for S-box construction and optimization by Kamal Zuhairi, Zamli, Din, Fakhrud, Alhadawi, Hussam S.

    Published 2023
    “…This paper introduces a new variant of the metaheuristic algorithm based on the naked mole rat (NMR) algorithm, called the Q-learning naked mole rat algorithm (QL-NMR), for substitution box construction and optimization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Development of a scheduling tool for constructing a Malaysian school timetable using genetic algorithms / Salihin Farag Shoeeb by Salihin Farag , Shoeeb

    Published 2003
    “…A recent approach to derive a near-optimal solution is to use evolutionary or genetic algorithms. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Design and analysis of construction and recombination module using Idury Waterman Algorithm for fragment assembly application / Hafifi Mohd Rafi by Mohd Rafi, Hafifi

    Published 2012
    “…There is several algorithms use in sequencing of DNA fragment. This paper presents a study on design and analysis of construction and recombination module using IduryWaterman algorithm and fragment assembly application using Verilog. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A data mining approach to construct graduates employability model in Malaysia by Sapaat, Myzatul Akmam, Mustapha, Aida, Ahmad, Johanna, Chamili, Khadijah, Muhamad, Rahamirzam

    Published 2011
    “…The performance of Bayes algorithms are also compared against a number of tree-based algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    An evolutionary based features construction methods for data summarization approach by Rayner Alfred, Suraya Alias, Chin, Kim On

    Published 2015
    “…Here, feature construction methods are applied in order to improve the descriptive accuracy of the DARA algorithm.This research proposes novel feature construction methods, called Variable Length Feature Construction without Substitution (VLFCWOS) and Variable Length Feature Construction with Substitution(VLFCWS), in order to construct a set of relevant features in learning relational data. …”
    Get full text
    Get full text
    Research Report
  15. 15
  16. 16

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    A Scalable Algorithm for Constructing Frequent Pattern Tree by Noraziah, Ahmad, Herawan, Tutut, Zailani, Abdullah, Mustafa, Mat Deris

    Published 2014
    “…Thus, twice database scanning is a key and major limitation in completing the construction of FP-Tree. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…MSCIF integrates three main algorithms: clustering algorithm, selection algorithm, and a synchronized flooding. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Strategies for effective value management practice in construction industry by Zulhkiple, A. Bakar

    Published 2017
    “…The objectives were to develop a new optimisation algorithm and apply the results to control construction project costs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20