Search Results - (( data application _ algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We used a Drebin data sample, which is a collection of 5,560 applications, as well as clean data sample containing 1,846 applications. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  4. 4

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  6. 6
  7. 7
  8. 8

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Development of decentralized data fusion algorithm with optimized kalman filter. by Quadri, Sayed Abulhasan

    Published 2016
    “…In all the applications, various data fusion algorithms such as Kalman filter algorithm, factor analysis (FA) algorithm and the proposed QR-FA algorithm are compared on basis of estimation error. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Development of heuristic task scheduling algorithm in cloud computing by Diallo, Laouratou, Hassan Abdalla Hashim, Aisha, Olanrewaju, Rashidah Funke

    Published 2016
    “…To this direction, in this paper we make a summary of some scheduling algorithms and propose an Enhanced Greedy Heuristic Scheduling Algorithm (EGHSA) for task scheduling adapted for big data applications. …”
    Get full text
    Get full text
    Proceeding Paper
  13. 13
  14. 14

    Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms by Raheem, Ajiboye Adeleke, Hauwau, Isah-Kebbe, O., Oladele Tinuke

    Published 2014
    “…Exploring the dataset features through the application of clustering algorithms is a viable means by which the conceptual description of such data can be revealed for better understanding, grouping and decision making. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Data discovery algorithm for scientific data grid environment by Abdullah, Azizol, Othman, Mohamed, Sulaiman, Md. Nasir, Ibrahim, Hamidah, Othman, Abu Talib

    Published 2005
    “…By using this model, we study various discovery algorithms for locating data sets in a data grid system. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm by Mohammed Alaidaros, Hashem

    Published 2007
    “…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
    Get full text
    Get full text
    Thesis
  17. 17

    On density-based data streams clustering algorithms: A survey by Teh, Y.W.

    Published 2017
    “…Recently, a lot of density-based clustering algorithms are extended for data streams. The main idea in these algorithms is using density-based methods in the clustering process and at the same time overcoming the constraints, which are put out by data stream’s nature. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Improved genetic algorithm for scheduling divisible data grid application by Kaid, Monir Abdullah Abduh, Othman, Mohamed, Ibrahim, Hamidah, K. Subramaniam, Shamala

    Published 2007
    “…In this paper, we exploit this property and propose an Improved Genetic Algorithm (IGA) for scheduling divisible data grid applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20