Search Results - (( development based context algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- development based »
- context algorithm »
- java application »
- based context »
-
1
Machine learning algorithms in context of intrusion detection
Published 2016Get full text
Get full text
Conference or Workshop Item -
2
CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK
Published 2023“…The quantitative results obtained demonstrated improvements in terms of delay and jitter with an average of 68.49% and 44.87% respectively. Based on these, it is proven that the algorithm with contextual aware performs better for delay and jitter while maintaining the throughput as compared to the algorithm without contextual aware.…”
text::Thesis -
3
Context-Aware Recommender System based on machine learning in tourist mobile application / Nor Liza Saad … [et al.]
Published 2022“…For the initial framework, the tourist mobile application prototype was developed based on Penang tourist areas by using Waterfall Model system development approach. …”
Get full text
Get full text
Get full text
Article -
4
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
5
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…Use of Internet enabled mobile devices has facilitated the rapid development of location-based services (LBS). LBS allow users to access useful information such as the nearest ATM, temple, and so on. …”
Get full text
Get full text
Get full text
Article -
6
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…Most of the existing location cloaking algorithms are only concerned with snapshot user locations and cannot effectively prevent users from location-dependent attacks when user location-contexts are continuously updated. …”
Get full text
Get full text
Article -
7
Clustering ensemble learning method based on incremental genetic algorithms
Published 2012“…So far, limited genetic-based clustering ensemble algorithms have been developed. …”
Get full text
Get full text
Thesis -
8
Multilevel optimization for dense motion estimation
Published 2011“…We evaluated the performance of different optimization techniques developed in the context of optical flow computation with different variational models.In particular, based on truncated Newton methods (TN) that have been an effective approach for large-scale unconstrained optimization, we developed the use of efficient multilevel schemes for computing the optical flow.More precisely, we evaluated the performance of a standard unidirectional multilevel algorithm - called multiresolution optimization (MR/Opt), to a bidrectional multilevel algorithm - called full multigrid optimization (FMG/Opt).The FMG/Opt algorithm treats the coarse grid correction as an optimization search direction and eventually scales it using a line search. …”
Get full text
Get full text
Get full text
Monograph -
9
Smart and energy aware routing for the internet of mobile things
Published 2021“…Result also shows that when delay instruction is applied before routing message is generated can contributes in the energy efficient context. This can also be concluded that the SEA routing algorithm is smart and energy aware based on the results obtained.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
The Evaluation of Cyclostationarity-Based Spectrum Sensing in Multipath Fading Channel
Published 2010“…These algorithms were developed in context of WRAN 802.22; the first cognitive radio standard, for TV-PAL and wireless microphone as the primary users. …”
Get full text
Get full text
Conference or Workshop Item -
11
Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul
Published 2006“…Following this, at the formational level, various local mechanisms are investigated in the context of the biological development of the proposed neural architectures. …”
Get full text
Get full text
Thesis -
12
Modified word representation vector based scalar weight for contextual text classification
Published 2024“…To validate this algorithm, the modified word vectors are compared with original LLM-generated word vectors to evaluate their reflection of the intended context. …”
Get full text
Get full text
Get full text
Thesis -
13
Old Jawi manuscript: Digital recognition / Zaidi Razak
Published 2016“…The information gathered is useful for the development of a line segmentation algorithm, a new character segmentation algorithm, as well as a recognition algorithm which is based on the use of a unique code and Hamming distance calculation. …”
Get full text
Get full text
Thesis -
14
Towards Software Product Lines Optimization Using Evolutionary Algorithms
Published 2019“…This research provides a framework to compare the performance of different multi-objective Evolutionary Algorithms in software product line context. We report on the problem encoding, variation operators and different types of algorithms: Indicator Based Evolutionary Algorithm (IBEA), Non-Dominated Sorting Genetic Algorithm II (NSGA-II), Multi-Objective Evolutionary Algorithms based on Decomposition (MOEA/D) and Strength Pareto Evolutionary algorithm II (SPEA-II). …”
Get full text
Get full text
Proceeding Paper -
15
A hybrid controller method with genetic algorithm optimization to measure position and angular for mobile robot motion control
Published 2023“…For this, a domain controller will be developed based on the attributes of the Fuzzy-PID parameters. …”
Get full text
Get full text
Get full text
Article -
16
Computational intelligence based power tracing for nondiscriminatory losses charge allocation and voltage stability improvement. / Zulkifli Abdul Hamid
Published 2013“…In addition, the proposed technique was able to promote fair losses charge allocation by involving imaginary consumers other than generation companies (GENCOs) and distribution companies (DISCOs); where, not all conventional tracing techniques include such consideration in their pricing scheme. Subsequently, the developed tracing algorithm was modified in the context of stability index tracing……”
Get full text
Get full text
Book Section -
17
An immunological-based simulation: A case study of risk concentration for mobile spam context assessment
Published 2024Get full text
Get full text
journal::journal article -
18
Rabbit breed classification using CNN / Aishah Nabila Mohd Zaid
Published 2024“…This project aims to study the CNN algorithm's efficacy in rabbit breed classification, develop a CNN-based prototype, and evaluate its accuracy. …”
Get full text
Get full text
Thesis -
19
A hybrid controller method with genetic algorithm optimization to measure position and angular for mobile robot motion control
Published 2023“…For this, a domain controller will be developed based on the attributes of the Fuzzy-PID parameters. …”
Get full text
Get full text
Get full text
Article -
20
A hybrid controller method with genetic algorithm optimization to measure position and angular for mobile robot motion control
Published 2023“…For this, a domain controller will be developed based on the attributes of the Fuzzy-PID parameters. …”
Get full text
Get full text
Get full text
Article
