Search Results - (( java application modified algorithm ) OR ( data application during algorithm ))

Refine Results
  1. 1

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6
  7. 7

    COVID-19 DATA EXPLORATION USING MAPPER ALGORITHM by Carey, Ling Yu Fan

    Published 2023
    “…Application of mapper algorithm through Kepler Mapper, a python implementation of mapper is done to construct mapper graphs for state wise COVID�19 data in Malaysia along year 2021. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  8. 8

    Semantic-k-NN algorithm: An enhanced version of traditional k-NN algorithm by Ali, M., Jung, L.T., Abdel-Aty, A.-H., Abubakar, M.Y., Elhoseny, M., Ali, I.

    Published 2020
    “…It is aimed for general security applications such as finding (the confidentiality level of the data when the algorithm is trained with multiple training categories during the data classification phase. …”
    Get full text
    Get full text
    Article
  9. 9

    Semantic-k-NN algorithm: An enhanced version of traditional k-NN algorithm by Ali, M., Jung, L.T., Abdel-Aty, A.-H., Abubakar, M.Y., Elhoseny, M., Ali, I.

    Published 2020
    “…It is aimed for general security applications such as finding (the confidentiality level of the data when the algorithm is trained with multiple training categories during the data classification phase. …”
    Get full text
    Get full text
    Article
  10. 10

    An efficient real-time terrain data organization and visualization algorithm based on enhanced triangle-based level of detail technique by Zamri, Muhamad Najib

    Published 2006
    “…According to the results obtained during the pre-processing, the partitioning of digital elevation data into tiles has successfully reduced the data size although it required a longer processing time. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar by Jaafar, Siti Aisyah

    Published 2021
    “…The relationships among accuracy and efficiency for object interaction and data transfer were investigated. The analysis was done by collecting multiple sets of timestamps data during the AR remote monitoring for the colour sorting conveyor. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    SURE-Autometrics algorithm for model selection in multiple equations by Norhayati, Yusof

    Published 2016
    “…The SURE-Autometrics is also validated using two sets of real data by comparing the forecast error measures with five model selection algorithms and three non-algorithm procedures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20