Search Results - (( developing messaging search algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks by Barjini, Hassan

    Published 2012
    “…Thus, the proposed algorithms enhance the performance of the search by reducing redundant messages, increasing the success rate and decreasing latency. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Statistical selection algorithm for peer-to-peer system by Othman, Mohamed, Kweh, Yeah Lun

    Published 2008
    “…Over the years, the distributed database has been developed so fast that there's a need to develop an effective selection algorithm for it. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Revisit of statistical selection algorithm for peer-to-peer system by Othman, Mohamed, Kweh, Yeah Lun

    Published 2008
    “…Over the years, the distributed computing environment has been developed so fast that there’s a need to develop an effective selection algorithm for it. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Indoor parking location information through Short Message Service (SMS) / Nurul Hidayu Abdul Aziz by Abdul Aziz, Nurul Hidayu

    Published 2010
    “…Indoor Parking Location Information through Short Message Service (SMS) is developing to help the drivers to find back their vehicle using their mobile phone via text messaging technology. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Improvement and performance analysis on statistical selection algorithms by Kweh, Yeah Lun, Othman, Mohamed

    Published 2006
    “…Over the years, the distributed database has been developed so fast that there's a need to develop an effective selection algorithm for it. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah by Adewole Kayode, Sakariyah

    Published 2018
    “…In addition, microblogging messages are unstructured and noisy. These distinguished characteristics posed challenges to existing approaches for spam message detection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    A review of electric vehicle charging management based on the communication between EV, RSU and CS by Mohammed D., Mansor M.B., Hock G.C.

    Published 2024
    “…Developed countries continue to search for solutions to reduce carbon emissions and increase energy efficiency. …”
    Conference Paper
  13. 13

    Enhanced PAPR reduction and channel estimation techniques in multi-carrier wireless communication system by Ali Kareem, Nahar

    Published 2016
    “…First, a novel rotating phase shift (RPS) based on signal scrambling to reduce PAPR in OFDM system had been proposed. The search algorithm was used to solve the convex problem in selecting PAPR-RPS best phase shift factor based on the cost of computational complexity. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET by Waheed, Bassam M.S.

    Published 2014
    “…Another prominent approach is the Dominant Pruning (DP) which is a distributed dominating set algorithm developed to alleviate the impact of flooding in mobile ad-hoc networks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…For this purpose, we develop an autonomous system that learns from double-bounce emails collected at a mail server. …”
    Get full text
    Get full text
    Thesis