Search Results - (( developing effective commitment algorithm ) OR ( java information making algorithm ))
Search alternatives:
- effective commitment »
- commitment algorithm »
- information making »
- java information »
- making algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
3
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…Utilization of a solitary algorithm is not powerful for extra ordinary state security to information in cloud computing. …”
Get full text
Get full text
Get full text
Thesis -
4
-
5
-
6
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The support vector machines (SVM) algorithm obtained the overall best results of 94.5% accuracy, 91.8% precision, 91.7% recall, and 91.1% f-Measure while the naïve bayes (NB) algorithm obtained the best AUC score of 0.944 with the tweet data of Dato Seri Anwar. …”
Get full text
Get full text
Get full text
Thesis -
7
Effect of business social responsibility (BSR) on performance of SMEs in Nigeria
Published 2014“…Therefore, significant positive effects of commitment, trust, and perceived ethics suggest that the variables are important in relation to performance. …”
Get full text
Get full text
Get full text
Thesis -
8
Fraud detection in shipping industry based on location using machine learning comparison techniques
Published 2023“…Results from this study indicates the usage of k-NN is proven to be most effective algorithm in terms of performance and accuracy required by the shipping industry fraud detection.…”
text::Thesis -
9
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
Get full text
Get full text
Thesis -
10
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…To collect data, we enlisted the help of 4,500 people. We collect information on 23 asthma-related characteristics. We utilized eight robust machine learning algorithms to analyze this dataset. …”
Get full text
Get full text
Get full text
Article -
11
Constrained clustering approach to aid in remodularisation of object-oriented software systems / Chong Chun Yong
Published 2016“…Even if maintainers possess additional information that could be useful to guide and improve the clustering results, traditional clustering algorithms have no way to take advantage of this information. …”
Get full text
Get full text
Thesis -
12
AI powered asthma prediction towards treatment formulation : An android app approach
Published 2022“…To collect data, we enlisted the help of 4,500 people. We collect information on 23 asthma-related characteristics. We utilized eight robust machine learning algorithms to analyze this dataset. …”
Get full text
Get full text
Get full text
Article -
13
Examining leadership style and ethical reasoning in Nigeria public sector
Published 2016“…Findings also showed that the relationship between transformational leadership and post conventional cognitive moral development was found to be significantly moderated by religiosity commitment and vertical individualism and collectivism. …”
Get full text
Get full text
Get full text
Thesis -
14
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
15
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
Published 2006“…This thesis investigates the effect of different scheduling mechanisms and usage of a different marker algorithms then develop and implement a fair scheduling mechanism and integrate it with a shaper with the usage of a very fair efficient marker at the edge of the DiffServ networks with the usage of simulation and analytical techniques. …”
Get full text
Get full text
Thesis -
16
Solving Unit Commitment Problem Using Multi-agent Evolutionary Programming Incorporating Priority List
Published 2023“…This paper presents an approach to solve the unit commitment problem using a newly developed Multi-agent Evolutionary Programming incorporating Priority List optimisation technique (MAEP-PL). …”
Article -
17
-
18
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Optimal economic load dispatch using multiobjective cuckoo search algorithm
Published 2023“…In this paper, Multiobjective Cuckoo Search Algorithm (MOCSA) is developed to solve Economic Load Dispatch (ELD) problem. …”
Article -
20
Unit commitment in power system using multi-agent evolutionary programming incorporating priority listing optimisation technique / Muhammad Nazree Che Othman
Published 2013“…From the result obtained and the comparative study conducted, it is proved that the proposed MAEP-PL optimisation technique has able to solve the unit commitment problem where, the total daily generation cost is effectively minimised and the computation time is reduced as compared to other techniques.…”
Get full text
Get full text
Thesis
