Search Results - (( developing access control algorithm ) OR ( java code classification algorithm ))
Search alternatives:
- code classification »
- developing access »
- java »
-
1
Object-Oriented Programming semantics representation utilizing agents
Published 2011“…A formal algorithm that can be applied to any two related Java-based source codes examples is invented to generate the semantics of these source codes. …”
Get full text
Get full text
Get full text
Article -
2
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
Get full text
Get full text
Monograph -
3
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
Get full text
Get full text
Thesis -
4
-
5
A Quantum Lightning Search Algorithm-Based Fuzzy Speed Controller for Induction Motor Drive
Published 2023Article -
6
-
7
-
8
-
9
-
10
-
11
A federated usage control framework with ontology-based policy and elimination of irrelevant rules set algorithm for grid computing authorization
Published 2019“…A high-level granularity access control model needs to be applied to achieve a fine-grained authorization. …”
Get full text
Get full text
Thesis -
12
An optimal LFC in two-area power systems using a meta-heuristic optimization algorithm
Published 2023Article -
13
-
14
-
15
-
16
Experimental evaluation of bottleneck link utilization with new-additive increase multiplicative decrease congestion avoidance and control algorithm.
Published 2009“…And we can define the utilization as simply the throughput divided by the access rate. And also all the developments for the congestion control and avoidance algorithms interest about the using of network resources and use the links capacity (utilization). …”
Get full text
Get full text
Article -
17
Face recognition door lock system / Danial Haziq Hakimi Salahuddin
Published 2023“…The system provides a reliable and efficient method of access control while eliminating the need for traditional keys or access cards, making it convenient for users. …”
Get full text
Get full text
Student Project -
18
Priority hybrid and EEF uplink scheduling algorithm for IEEE 802.16E
Published 2013“…In this research, two algorithms tailored at enhancing the performance of hybrid algorithms in the WiMAX domains have been designed and developed. …”
Get full text
Get full text
Thesis -
19
-
20
