Search Results - (( java application during algorithm ) OR ( data implications from algorithm ))
Search alternatives:
- application during »
- data implications »
- implications from »
- java application »
- during algorithm »
- from algorithm »
-
1
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
2
Using predictive analytics to solve a newsvendor problem / S. Sarifah Radiah Shariff and Hady Hud
Published 2023“…The best algorithm will not be the same for all the data sets. …”
Get full text
Get full text
Book Section -
3
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
4
Application Of Bibliometric Analysis on Root Growth Algorithm
Published 2024“…An article reviewed and analyzed bibliographic data on metaheuristics but is not specific on the topic of root growth algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Malware Classification and Detection using Variations of Machine Learning Algorithm Models
Published 2025“…Types of attacks can be Ping of Death, flooding, remote-controlled attacks, UDP flooding, and Smurf Attacks. Attack data was obtained from the ClaMP dataset, which has an unbalanced data set, and has very high noise, so it is necessary to analyze data packets in network logs and optimize feature extraction which is then analyzed statistically with machine learning algorithms. …”
Get full text
Get full text
Get full text
Article -
6
-
7
Algoritma pendaraban nombor perpuluhan dari perspektif pelajar Tingkatan Satu
Published 2001“…This study discusses the algorithms in multiplication involving decimal numbers from the perspectives of Form One students. …”
Get full text
Get full text
Get full text
Article -
8
-
9
-
10
Algorithms for moderating effect of emotional value from a cross-media data fusion perspective: a case study of Chinese dating reality shows
Published 2026“…Preprocessing removes noise from text data, normalizes sentiment word lists and undertakes temporal transformation. …”
Get full text
Get full text
Article -
11
A Method for Mapping XML DTD to Relational Schemas In The Presence Of Functional Dependencies
Published 2008“…To approach the mapping problem, three different components are explored: the mapping algorithm, functional dependency for XML, and implication process. …”
Get full text
Get full text
Thesis -
12
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
13
-
14
Age detection from face using Convolutional Neural Network (CNN) / Hanin Hanisah Usok @ Yusoff
Published 2024“…Following a thorough examination of numerous algorithms, CNN was determined to be the best effective method for age recognition from facial features due to its ability to automatically extract important data. …”
Get full text
Get full text
Thesis -
15
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
16
Agreement options for negotiation on material location decision of housing development
Published 2020“…Social implications: The satisficing algorithm of the coalition will satisfy all stakeholders. …”
Get full text
Get full text
Article -
17
Prediction of payment method in convenience stores using machine learning
Published 2023“…The Random Forest algorithm was employed due to its robustness in handling complex, high-dimensional data, and its ability to provide reliable predictions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Not seeing the forest for the trees: Generalised linear model out-performs random forest in species distribution modelling for Southeast Asian felids
Published 2023“…Using felid presence-absence data from three study regions in Southeast Asia (mainland, Borneo and Sumatra), we tested the performances of SDMs by implementing four modelling frameworks: GLM and RF with bootstrapped and non-bootstrapped training data. …”
Get full text
Get full text
Article -
19
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Ethical implications of artificial intelligence in nursing care: a systematic literature review from an Islamic perspective
Published 2025“…The synthesis identified three primary ethical themes: 1) Safety, with subthemes of data privacy, misuse, algorithm bias, and physical safety; 2) Human element, focusing on trust, empathy, and human touch; and 3) Autonomy and informed decision-making. …”
Get full text
Get full text
Get full text
Article
