Search Results - (( basic computing ((data algorithm) OR (new algorithm)) ) OR ( java application use algorithm ))
Search alternatives:
- java application »
- basic computing »
- application use »
- data algorithm »
- new algorithm »
- use algorithm »
-
1
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Computer B will send the data to the BASIC Stamp and the BASIC Stamp will check their program. …”
Get full text
Get full text
Monograph -
2
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Voting algorithms for large scale fault-tolerant systems
Published 2011“…By extracting various plots from different aspects, we demonstrated that, compared to the basic algorithm, our algorithm has higher reliability and availability as the quantity of the input data increases. …”
Get full text
Get full text
Thesis -
4
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…Sockets programming is one f the most basic and useful method of achieving any client server connectivity. …”
Get full text
Get full text
Thesis -
5
Knowledge-based genetic algorithm for multidimensional data clustering
Published 2013Get full text
Get full text
Get full text
Proceeding Paper -
6
-
7
Scheduling scientific workflow using multiobjective algorithm with fuzzy resource utilization in multi-cloud environment
Published 2020“…The coding scheme jointly considers task execution location and data transportation order. Simulation experiments reveal that FR-MOS outperforms the basic MOS over the PSO algorithm.…”
Get full text
Get full text
Article -
8
-
9
-
10
A new 128-bit block cipher
Published 2009“…This block cipher is suitable to be applied to small devices such as mobile phones and PDAs. The existence of this new 128-bit block cipher algorithm will increase the protection of the national information infrastructure and also will contribute as an alternative to other cryptographic algorithms in security in the computing industry.…”
Get full text
Get full text
Thesis -
11
A highly efficient algorithm for phased-array mmWave massive MIMO beamforming
Published 2021“…Simulation results show that the proposed algorithm significantly improves system performance and reduces computational complexity by more than 45% compared to traditional algorithms.…”
Get full text
Get full text
Article -
12
-
13
Volterra algorithm for modelling sea surface current circulation from satellite altimetry data
Published 2008Get full text
Get full text
Book Section -
14
-
15
A Survey Of Supervised Machine Learning In Wireless Sensor Network: A Power Management Perspective
Published 2013“…Machine learning algorithms are considered as an efficient way for decision making in computational environments. …”
Get full text
Get full text
Conference or Workshop Item -
16
A modified reweighted fast consistent and high-breakdown estimator for high-dimensional datasets
Published 2024“…Thus, the new proposed algorithm can be applied to solve the problem of regression outliers in high-dimensional data (HDD) and serve as a better alternative to the minimum regularized covariance determinant (MRCD) estimator. © 2024 The Author(s)…”
Get full text
Get full text
Get full text
Article -
17
Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining.
Published 2005“…The fast growing size of databases has resulted in a great demand for tools capable of analyzing data with the aim of discovering new knowledge and patterns. …”
Get full text
Get full text
Thesis -
18
Computational biology: where nature meets technology / Ts Faikah Awang @ Ismail and Ts Mohamad Shahrimi Hashim
Published 2023“…It all began in the early 1970s when basic artificial intelligence was developed to create the neural network model for the human brain to generate new algorithms. …”
Get full text
Get full text
Article -
19
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article -
20
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article
