Search Results - (( development programme replication algorithm ) OR ( java affecting use algorithm ))
Search alternatives:
- programme replication »
- replication algorithm »
- affecting use »
- use algorithm »
- java »
-
1
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…This novel approacho for integrating separator Database and Framework using these choices of Java collections outperforms with pseudoprojectionin terms of CPU performance and memory. …”
Get full text
Thesis -
2
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…This novel approacho for integrating separator Database and Framework using these choices of Java collections outperforms with pseudoprojectionin terms of CPU performance and memory. …”
Get full text
Get full text
Thesis -
3
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
Get full text
Get full text
Thesis -
4
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…We accomplished asthma therapy using an Android application developed in Java and running on the Android Studio platform.…”
Get full text
Get full text
Get full text
Article -
5
AI powered asthma prediction towards treatment formulation : An android app approach
Published 2022“…We accomplished asthma therapy using an Android application developed in Java and running on the Android Studio platform.…”
Get full text
Get full text
Get full text
Article -
6
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The proposed system is then designed and developed using Java programming language. The performance of the proposed system is evaluated in a two-floor building using offthe- shelf WLAN access points and client device. …”
Get full text
Get full text
Thesis -
7
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…The FD idea has previously been used to solve security problems, while military intelligence operations have inspired the TMS and have never been used in WSNs. …”
Get full text
Get full text
Article -
8
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
9
-
10
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis
