Search Results - (( based competency drops algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- based competency »
- competency drops »
- java implication »
-
1
Traffic scheduling and link sharing mechanisms for controlled load service / Chin Yun Choong
Published 2000“…The simulation adopts some of the features of the Class Based Queueing. The main factors that determine whether a packet scheduling algorithm is able to support integrated services or differentiated services on Internet is the ability to provide bandwidth guarantee. …”
Get full text
Get full text
Thesis -
2
Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants
Published 2019“…The results of the study were conducted, based on the accuracy of SVM, which was 82.33% and C4.5 89.29 %%. …”
Get full text
Get full text
Conference or Workshop Item -
3
Simulated Kalman Filter algorithms for solving optimization problems
Published 2019“…The proposed population-based SKF algorithm and the single solution-based SKF algorithm use the scalar model of discrete Kalman filter algorithm as the search strategy to overcome these flaws. …”
Get full text
Get full text
Thesis -
4
-
5
Performance monitoring algorithm for optimizing electrical power generated by using photovoltaic system
Published 2016Get full text
Get full text
Conference or Workshop Item -
6
A new countermeasure to combat the embedding-based attacks on the goldreich-goldwasser-halevi lattice-based cryptosystem
Published 2024“…Despite being considered the first practical lattice-based cryptosystem, interest from the post-quantum cryptography society in the Goldreich-Goldwasser-Halevi (GGH) lattice-based cryptosystem drastically drop due to the embedding-based attacks. …”
Get full text
Get full text
Get full text
Article -
7
A new countermeasure to combat the embedding-based attacks on the Goldreich-Goldwasser-Halevi lattice-based cryptosystem
Published 2024“…Despite being considered the first practical lattice-based cryptosystem, interest from the post-quantum cryptography society in the Goldreich-Goldwasser-Halevi (GGH) lattice-based cryptosystem drastically drop due to the embedding-based attacks. …”
Get full text
Get full text
Get full text
Article -
8
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis
