Search Results - (( java application customization algorithm ) OR ( knowledge optimization connection algorithm ))
Search alternatives:
- customization algorithm »
- optimization connection »
- knowledge optimization »
- connection algorithm »
- java application »
-
1
A framework of rough cultural algorithms in optimizing mobile web caching performance
Published 2007“…Simultaneously, Cultural Algorithms (CA) will be exploited to optimize the performance of proxy caching in accumulating the knowledge between each generation. …”
Get full text
Get full text
Article -
2
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…For this reason, many intelligent systems have been utilized to design routing algorithms to handle the network's dynamic state. In this paper, an ant colony optimization (ACO) based WSN routing algorithm for IoT has been proposed and analyzed to enhance scalability, to accommodate node mobility and to minimize initialization delay for time critical applications in the context of IoT to find the optimal path of data transmission, improvising efficient IoT communications. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning
Published 2019“…This algorithm maintains the local optimal radius of micro-clusters rather than a global and constant radius. …”
Get full text
Get full text
Thesis -
4
Fuzzy modelling using firefly algorithm for phishing detection
Published 2019“…To generate the fuzzy parameters automatically, an optimization method is needed. One of the suitable methods provides the Firefly Algorithm (FA). …”
Get full text
Get full text
Get full text
Article -
5
Modeling and control of a Pico-satellite attitude using Fuzzy Logic Controller
Published 2010“…The performances obtained show that the optimized APFLC is better than the non-optimize APFLC in terms of RMSE and the settling time.…”
Get full text
Thesis -
6
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
7
-
8
Real-time anomaly detection using clustering in big data technologies / Riyaz Ahamed Ariyaluran Habeeb
Published 2019“…Meanwhile, Spark Streaming effectively provides illustrious abstraction known as DStream, signifying an uninterrupted stream of data whereas Spark MLlib leverages algorithmic optimizations of MLlib and applies them in the proposed algorithms. …”
Get full text
Get full text
Get full text
Thesis -
9
SDN-based VANET routing: A comprehensive survey on architectures, protocols, analysis, and future challenges
Published 2024“…As the automotive and telecommunication industries advance, more vehicles are becoming connected, leading to the realization of intelligent transportation systems (ITS). …”
Get full text
Get full text
Get full text
Article -
10
A hybrid deep CNN model for fast class-incremental food classification / Aymen Taher Ahmed al-Ashwal
Published 2019“…Lastly, the incremental learning algorithm ABACOC is used to classify each feature of food classes. …”
Get full text
Get full text
Get full text
Thesis -
11
Robust overlapping community detection in complex networks with graph convolutional networks and fuzzy C-means
Published 2024“…GCNFCM extracts node embeddings from CNs, considering both topology and attributes through a dual-decoder design (inner product and GCN), while FCM is employed for optimal overlapping community detection. Furthermore, FCM is guided by the modularity Q algorithm for accurate community identification without requiring prior knowledge of the community count. …”
Get full text
Get full text
Get full text
Article -
12
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
SDN-Based VANET Routing: A Comprehensive Survey on Architectures, Protocols, Analysis, and Future Challenges
Published 2025“…As the automotive and telecommunication industries advance, more vehicles are becoming connected, leading to the realization of intelligent transportation systems (ITS). …”
Article -
14
Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines
Published 2020“…The hybrid discrete wavelet multiresolution analyses and machine learning (DWMRA-ML) algorithm is deployed to discover the hidden useful knowledge extraction from the 1-cycle short circuit transient fault signals (voltage and current) from healthy and fault lines section. …”
Get full text
Get full text
Thesis -
15
Artificial Neural Network-Forecasted Compression Strength of Alkaline-Activated Slag Concretes
Published 2022“…The prediction accuracy of the optimal ANN model was then compared to existing ANN-based models, while the variable selection was compared to existing AASC models with other machine learning algorithms, due to limitations in the ANN-based model. …”
Get full text
Get full text
Get full text
Get full text
Article
