Search Results - (( java application clustering algorithm ) OR ( knowledge implementation some algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…Firstly, k-luster could incorporate additional clustering algorithms, or even classification algorithms in the future. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Fuzzy modeling of brain tissues in Bayesian segmentation of brain MR images by Farzan, Ali, Ramli, Abdul Rahman, Mashohor, Syamsiah, Mahmud, Rozi

    Published 2010
    “…Results show that our algorithm performs well in comparison with the one implemented in SPM. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Semantic analysis system by using latent semantic analysis (LSA) algorithm on khutbah texts / Ammar Zuber by Zuber, Ammar

    Published 2019
    “…As nowadays, some muslims attend the Friday Prayers just to obey God instruction instead of willingly come to gain new knowledge. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Talent classification using support vector machine technique / Hamidah Jantan, Norazmah Mat Yusof and Mohd Hanapi Abdul Latif by Jantan, Hamidah, Mat Yusof, Norazmah, Abdul Latif, Mohd Hanapi

    Published 2014
    “…The objective of this study is to suggest the potential classification model for talent forecasting throughout some experiments using SVM learning algorithm. In the experimental phase, we use employee’s performance data from selected organization to develop talent classification model which can be used to handle some tasks in talent management. …”
    Get full text
    Get full text
    Research Reports
  10. 10
  11. 11

    High performance visualization of human tumor growth software by Alias, Norma, Mohd. Said, Norfarizan, Khalid, Siti Nur Hidayah, Sin, Dolly Tien Ching, Phang, Tau Ing

    Published 2008
    “…This paper focuses on the implementation of parallel algorithm for the simulation of hyperbolic equation for breast pressure and parabolic equation of brain tumors growth. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Optimizing boarding school schedule using graph colouring : case study of Sekolah Menengah Sultan Abdul Halim / Nur Farhana Mohd Asri by Mohd Asri, Nur Farhana

    Published 2021
    “…The algorithm that produces the lowest minimum color will be selected to implement in the new possible schedule. …”
    Get full text
    Get full text
    Student Project
  13. 13

    Optimizing boarding school schedule using graph coloring: case study of Sekolah Menengah Sultan Abdul Halim / Nur Farhana Mohd Asri by Mohd Asri, Nur Farhana

    Published 2022
    “…The algorithm that produces the lowest minimum color will be selected to implement in the new possible schedule. …”
    Get full text
    Get full text
    Research Reports
  14. 14

    A Mobile Application For Stock Price Prediction by Choy, Yi Tou

    Published 2021
    “…The results show ARIMA has the least error among all five prediction algorithms. Therefore, ARIMA is the best prediction model to implement in the mobile application for stock price prediction. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  15. 15

    Multi-Backpropagation network by Wan Ishak, Wan Hussain, Siraj, Fadzilah, Othman, Abu Talib

    Published 2002
    “…Backpropagation (or backprop) algorithm is one of the well-known algorithms in neural networks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    Implementing universal priority DBA algorithm in PIC based EPON testbed by Radzi N.A.M., Din N.M., Al-Mansoori M.H., Majid M.S.A., Abdullah F.

    Published 2023
    “…For proof-of-concept, the UDBA algorithm is implemented inside a proposed peripheral interface controller (PIC) based EPON testbed in order to evaluate the communication protocol involved. …”
    Article
  18. 18
  19. 19

    MFA-OSELM Algorithm For Wifi-Based Indoor Positioning System by AL-Khaleefa, Ahmed Salih, Mohd Riduan, Ahmad, Awang Md Isa, Azmi, AL-Saffar, Ahmed, Mohd Esa, Mona Riza, Malik, Reza Firsandaya

    Published 2019
    “…Facilitating the use of WiFi for this purpose requires fingerprint formation and the implementation of a learning algorithm with the aim of using the fingerprint to determine locations. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Application of machine learning and artificial intelligence in detecting SQL injection attacks by Md Sultan, Abu Bakar, Agiliga, Nwabudike Augustine, Osman, Mohd Hafeez Bin, Sharif, Khaironi Yatim

    Published 2024
    “…The study uses a mixed-methods approach to evaluate how well different AI and ML algorithms identify SQL injection attacks by combining algorithmic evaluation with empirical investigation. …”
    Get full text
    Get full text
    Get full text
    Article