Search Results - (( developing world connection algorithm ) OR ( java data optimization algorithm ))
Search alternatives:
- connection algorithm »
- data optimization »
- developing world »
- java »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
Get full text
Get full text
Article -
3
A random search based effective algorithm for pairwise test data generation
Published 2011“…This paper proposes an effective random search based pairwise test data generation algorithm named R2Way to optimize the number of test cases. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Scalable approach for mining association rules from structured XML data
Published 2009Get full text
Get full text
Conference or Workshop Item -
5
EasyA: Easy and effective way to generate pairwise test data
Published 2013“…This paper proposes a matrix based calculation for pairwise test data generation algorithm named EasyA to optimize the number of test cases. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
-
9
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. The proposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Thesis -
10
New approach of cryptography algorithm for e- mail applications
Published 2005“…The purpose of this paper is to introduce and demonstrate a new algorithm for Internet and e-mail security. The purposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Conference or Workshop Item -
11
Elastic-TCP: flexible congestion control algorithm to adapt for high-BDP networks
Published 2019“…In the last decade, the demand for Internet applications has been increased, which increases the number of data centers across the world. These data centers are usually connected to each other using long-distance and high-speed networks. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Forecasting of photovoltaic output using hybrid particle swarm optimization-artificial neural network model / Muhamad Faizol Adli Abdullah
Published 2010“…Backpropagation (BP) algorithm is widely used to solve many real world problems by using the concept of Multilayer Perception (MLP). …”
Get full text
Get full text
Thesis -
14
Functional Connectivity Assessment on Aging Brain using Functional Near Infrared Spectroscopy (fNIRS)
Published 2017“…They performed three categories of semantic verbal fluency test while neuronal activity in prefrontal cortex (PFC) measured using fNIRS. A new software algorithm has been developed to derive functional connectivity parameters. …”
Get full text
Get full text
Final Year Project -
15
Heart-design nexus: the emotion algorithm
Published 2025“…How might these approaches help create a world that is not just functionally efficient but emotionally enriching? …”
Get full text
Get full text
Book -
16
Automating commercial video game development using computational intelligence
Published 2011“…Pac-man. The resulting algorithm is referred to as an Evolution Strategies Neural Network or ESNet. …”
Get full text
Get full text
Get full text
Article -
17
Impact of multiplay transmission in mobile WIMAX using overlay scanning: article / Akmarya Syukhairilnisah Mohd Akhir
Published 2014“…In hard handover has a short time break known as handover interruption decrease the QoS due to connection between MS and serving BS closed and ranging hand initiation to establish new connection. …”
Get full text
Get full text
Article -
18
Incorporating stemming algorithm in the Malay information retrieval that employs Thesaurus aproach / Mohd Rosmadi Mokhtar
Published 2001“…A wide range of text-based information therefore can be searched and retrieved from online connection anywhere in the world. This type of popularity is due to advancement in technology that is rapidly growing from day to day. …”
Get full text
Get full text
Thesis -
19
Automatic Mind Maps Generation for The Holy Quran
Published 2022“…The majority of the Holy Quran learners suffer from lack of quality in memorization understanding and connecting its topics. Therefore, the aim of this paper is to develop an algorithm that automatically generate the topics based on the mind map of a set of verses in the Holy Quran. …”
Get full text
Get full text
Article -
20
Conclusion
Published 2019“…The book contains theoretical and practical knowledge of state-of-the-art authentication technologies and their applications in big data, IoT, and cloud computing with this technologically connected world. The first six chapters of the book provide the fundamental details of the authentication technologies.The objective of Chapters 7 to 11 is to develop fast and secure algorithms for resource-constrained IoT and cloud computing, while the aim of Chapter 12 is to protect the data by laws and policies. …”
Get full text
Get full text
Get full text
Book Chapter
