Search Results - (( developing constructing computational algorithm ) OR ( java applications usage algorithm ))
Search alternatives:
- constructing computational »
- applications usage »
- java applications »
- usage algorithm »
-
1
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…The experimental result shows that using Java 2, this method improves the speed of PrefixSpan up to almost two orders of magnitude as well as the memory usage to more than one order of magnitude.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016“…The search algorithm is a crucial part in any internet applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Ball surface representations using partial differential equations
Published 2015“…Two specific Ball surfaces, namely harmonic and biharmonic, are first constructed in developing the proposed algorithm. The former and later surfaces require two and four boundary conditions respectively. …”
Get full text
Get full text
Get full text
Thesis -
4
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
5
-
6
An Efficient Computational Algorithm for Solving Arbitrary Sylvester Matrix Equations in Fuzzy Control Theory (S/O 14179)
Published 2021“…With that, the constructed algorithm is considered as a new contribution to the application of control system theory…”
Get full text
Get full text
Monograph -
7
The Anglerfish algorithm: a derivation of randomized incremental construction technique for solving the traveling salesman problem
Published 2019“…Smart algorithms have been developed to address this issue. …”
Get full text
Get full text
Article -
8
Developing an algorithm for triad design
Published 2012Get full text
Get full text
Get full text
Article -
9
Development of symbolic algorithms for certain algebraic processes
Published 2007Get full text
Get full text
Get full text
Monograph -
10
Development of symbolic algorithms for certain algebraic processes
Published 2007Get full text
Get full text
Get full text
Monograph -
11
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. These algorithms are formulated for computing Tate and ate pairing. …”
Get full text
Get full text
Thesis -
12
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…IoT study fields currently involve security and privacy due to the fact that the installation of Cryptographic Internet Communications "ICs" for protected IC applications like Fog Computing and Cloud Computing devices is extremely crucial in any developing technology. …”
Get full text
Get full text
Get full text
Thesis -
13
Exam hall allocation using genetic algorithm / Norisyani Binti Fauzai
Published 2021Get full text
Get full text
Thesis -
14
-
15
A filtering algorithm for efficient retrieving of DNA sequence
Published 2009“…An automaton-based algorithm is used to develop the filtering process proposed. …”
Get full text
Get full text
Get full text
Article -
16
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
17
Parameter estimation of cocomo model using the jaya algorithm for software cost estimation
Published 2019“…The Constructive Cost Model (COCOMO) is a procedural software cost estimation model developed by Barry W. …”
Get full text
Get full text
Undergraduates Project Papers -
18
-
19
Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security
Published 2010“…Collaborative research with MIMOS Cyber-security Laboratory are using the strong UCE S-Boxes to develop hybrid round functions and key distribution algorithms to construct the UCE block cipher. …”
Get full text
Get full text
Proceeding Paper -
20
