Search Results - (( data implication path algorithm ) OR ( java implementation 5s algorithm ))
Search alternatives:
- java implementation »
- implementation 5s »
- data implication »
- implication path »
- path algorithm »
- 5s algorithm »
-
1
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
-
3
-
4
-
5
-
6
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
7
-
8
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. This application can be installing into the mobile phone.…”
Get full text
Get full text
Thesis -
9
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The support vector machines (SVM) algorithm obtained the overall best results of 94.5% accuracy, 91.8% precision, 91.7% recall, and 91.1% f-Measure while the naïve bayes (NB) algorithm obtained the best AUC score of 0.944 with the tweet data of Dato Seri Anwar. …”
Get full text
Get full text
Get full text
Thesis -
10
An Educational Tool Aimed at Learning Metaheuristics
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Mining association rules from structured XML data
Published 2009Get full text
Get full text
Conference or Workshop Item -
12
Scalable approach for mining association rules from structured XML data
Published 2009Get full text
Get full text
Conference or Workshop Item -
13
-
14
-
15
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
16
-
17
-
18
Cyber hygiene during Covid-19 to avoid cyber attacks
Published 2022“…Cyber security expenses have increased over the past decade while massive infringements of data and data leaks have also risen. In addition, we need to practice the best cyber hygiene behaviors in order to avoid cyber-attacks like phishing, data loss, and others. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
How social media crisis response and social interaction is helping people recover from Covid-19: an empirical investigation
Published 2022“…The assessments of the reflective measurement models based on path analysis in PLS-SEM are reliable and valid. …”
Get full text
Get full text
Article -
20
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis
