Search Results - (( developing messaging search algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing messaging »
- implication based »
- java implication »
- search »
-
1
Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks
Published 2012“…Thus, the proposed algorithms enhance the performance of the search by reducing redundant messages, increasing the success rate and decreasing latency. …”
Get full text
Get full text
Thesis -
2
Statistical selection algorithm for peer-to-peer system
Published 2008“…Over the years, the distributed database has been developed so fast that there's a need to develop an effective selection algorithm for it. …”
Get full text
Get full text
Get full text
Article -
3
Revisit of statistical selection algorithm for peer-to-peer system
Published 2008“…Over the years, the distributed computing environment has been developed so fast that there’s a need to develop an effective selection algorithm for it. …”
Get full text
Get full text
Conference or Workshop Item -
4
Indoor parking location information through Short Message Service (SMS) / Nurul Hidayu Abdul Aziz
Published 2010“…Indoor Parking Location Information through Short Message Service (SMS) is developing to help the drivers to find back their vehicle using their mobile phone via text messaging technology. …”
Get full text
Get full text
Thesis -
5
Improvement and performance analysis on statistical selection algorithms
Published 2006“…Over the years, the distributed database has been developed so fast that there's a need to develop an effective selection algorithm for it. …”
Get full text
Get full text
Conference or Workshop Item -
6
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
Get full text
Get full text
Thesis -
7
The application of metaheuristics in network routing and inventory routing problem / Huda Zuhrah Ab Halim
Published 2012“…An enhanced GA and VNS were developed and both algorithms were tested on small, medium and large problems. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
8
-
9
Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah
Published 2018“…In addition, microblogging messages are unstructured and noisy. These distinguished characteristics posed challenges to existing approaches for spam message detection. …”
Get full text
Get full text
Get full text
Thesis -
10
-
11
-
12
A review of electric vehicle charging management based on the communication between EV, RSU and CS
Published 2024“…Developed countries continue to search for solutions to reduce carbon emissions and increase energy efficiency. …”
Conference Paper -
13
Enhanced PAPR reduction and channel estimation techniques in multi-carrier wireless communication system
Published 2016“…First, a novel rotating phase shift (RPS) based on signal scrambling to reduce PAPR in OFDM system had been proposed. The search algorithm was used to solve the convex problem in selecting PAPR-RPS best phase shift factor based on the cost of computational complexity. …”
Get full text
Get full text
Thesis -
14
A Systematic Review on Cover Selection Methods For Steganography: Trend Analysis, Novel Classification and Analysis of the Elements
Published 2026journal::journal article -
15
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
16
Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET
Published 2014“…Another prominent approach is the Dominant Pruning (DP) which is a distributed dominating set algorithm developed to alleviate the impact of flooding in mobile ad-hoc networks. …”
Get full text
Get full text
Get full text
Thesis -
17
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…For this purpose, we develop an autonomous system that learns from double-bounce emails collected at a mail server. …”
Get full text
Get full text
Thesis
