Search Results - (( java application customization algorithm ) OR ( knowledge applications function algorithm ))
Search alternatives:
- customization algorithm »
- knowledge applications »
- applications function »
- function algorithm »
- java application »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
2
-
3
Multiview Laplacian semisupervised feature selection by leveraging shared knowledge among multiple tasks
Published 2019“…Experiment results on several multimedia applications have shown that the proposed algorithm is competitive compared with the other single-view feature selection algorithms.…”
Get full text
Get full text
Article -
4
-
5
Hybrid Genetic Algorithm based Fuzzy Inference System for Data Regression
Published 2023Conference Paper -
6
Dissimilarity algorithm on conceptual graphs to mine text outliers
Published 2009“…The graphical text representation method such as Conceptual Graphs (CGs) attempts to capture the structure and semantics of documents.As such, they are the preferred text representation approach for a wide range of problems namely in natural language processing, information retrieval and text mining.In a number of these applications, it is necessary to measure the dissimilarity (or similarity) between knowledge represented in the CGs.In this paper, we would like to present a dissimilarity algorithm to detect outliers from a collection of text represented with Conceptual Graph Interchange Format (CGIF).In order to avoid the NP-complete problem of graph matching algorithm, we introduce the use of a standard CG in the dissimilarity computation.We evaluate our method in the context of analyzing real world financial statements for identifying outlying performance indicators.For evaluation purposes, we compare the proposed dissimilarity function with a dice-coefficient similarity function used in a related previous work.Experimental results indicate that our method outperforms the existing method and correlates better to human judgements. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
The impact of population size on knowledge acquisition in genetic algorithms paradigm: Finding solutions in the game of Sudoku
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Optimized processing of satellite signal via evolutionary search algorithm
Published 2000Get full text
Get full text
Article -
9
Fuzzy Type-1 Triangular Membership Function Approximation Using Fuzzy C-Means
Published 2020“…Membership functions determined through statistical and knowledge engineering methods are usually application dependent and cannot be applied on different datasets. …”
Get full text
Get full text
Conference or Workshop Item -
10
A shift column different offset for better Rijndael security
Published 2009Get full text
Get full text
Get full text
Article -
11
-
12
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004Get full text
Get full text
Thesis -
13
Normative Fish Swarm Algorithm For Global Optimization With Applications
Published 2019“…Referred to as Normative Fish Swarm Algorithm (NFSA), the proposed Fish Swarm Algorithm, Optimized by Particle Swarm Optimization with Extended Memory (PSOEM-FSA) is expanded by amalgamating the normative knowledge to provide supplementary guidelines for better global optimum achievement and convergence rate. …”
Get full text
Get full text
Thesis -
14
Statistical analysis, ciphertext only attack, improvement of generic quasigroup string transformation and dynamic string transformation
Published 2018“…Quasigroup String transformation is one of those primitives that have many applications in cryptographic algorithms, Hash functions, and Pseudo-Random Number Generators. …”
Get full text
Get full text
Article -
15
-
16
-
17
Nlfxlms and thf-nlfxlms algorithms for wiener-hammerstein nonlinear active noise control
Published 2016“…Filtered-X least mean square (FXLMS) control algorithm is a conventional algorithm employed to cancel the noise in linear environment. …”
Get full text
Get full text
Thesis -
18
-
19
-
20
Security analysis of data transmission in an IoT based platform for telemedicine
Published 2021“…This study proposes a modified folded pipeline architecture for resource restriction applications with an AES algorithm. Through time-multiplexing operations to a single functional unit, the folding transformation manages the circuit functions and decreases the time use for encryption and decryption by 30 percent and 20 percent, respectively. …”
Get full text
Get full text
Get full text
Article
