Search Results - (( java application modified algorithm ) OR ( basic relation new algorithm ))
Search alternatives:
- application modified »
- java application »
- new algorithm »
- relation new »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…There are several techniques to mine association rules from XML data. The basic approach is to map the XML documents to relational data model and to store them in a relational database. …”
Get full text
Get full text
Thesis -
2
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
3
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
4
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
Published 2019“…In relation to this, a new theoretical attack such as related-key differential cryptanalysis (RDC) could give rise to a more practical technique. …”
Get full text
Get full text
Get full text
Article -
5
A new 128-bit block cipher
Published 2009“…Towards that and after reviewing related research, in this research we propose to come up with a new 128-bit block cipher cryptographic algorithm which shall meet the security requirements. …”
Get full text
Get full text
Thesis -
6
Key exchange for new cryptosystem analogous to LUCELG and Cramer-Shoup
Published 2013“…Hence, one protocol will be proposed to provide the key establishment. Basically the protocol uses the second order linear recurrence relation and the multiplicative group of integers modulo p. …”
Get full text
Get full text
Get full text
Article -
7
Gradient-based mutation manta ray foraging optimization (gbm-mrfo) for solving constrained real-world problems
Published 2022“…In this paper, a new variant of Manta Ray Foraging Optimization (MRFO) algorithm is introduced to deal with real parameter constrained optimization problem. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
-
9
Mining The Basic Reproduction Number (R0) Forecast For The Covid Outbreak
Published 2022“…The study identified new cases, deaths, hospitalization, and ICU admission as important attributes to derive accurate COVID-19 Basic Reproduction Number, R0…”
Get full text
Get full text
Monograph -
10
Exploration of educational building with cultural elements using shape grammar
Published 2013“…During the design process, other rules are activated to embed new shapes within the basic building block. The rules are executed to generate designs to provide students a spacious environment for study and related activities. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Interactive learning package for artificial neural network (Demonstration Module) / Camellia Mohd Kamal
Published 2004“…For Perception there will be the Description Neuron Model, Perceptron Basic Architecture and perceptron Algorithm with one example of solved problem. …”
Get full text
Get full text
Thesis -
12
Reproducing kernel Hilbert space method for cox proportional hazard model
Published 2016“…Finally, we propose an algorithm of minimization of the loss function in the general Cox model. …”
Get full text
Get full text
Get full text
Thesis -
13
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
14
Modeling and design control strategy for unwind/rewind system
Published 2008“…This project was replaced the PLC to computer controlled method. A new control algorithm that based on the regulator feedback was proposed. …”
Get full text
Get full text
Thesis -
15
Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining.
Published 2005“…The accuracy for rules and classification resulted from the TIP method are compared with other methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) from Rough Set, Genetic Algorithm (GA), Johnson reducer, HoltelR method, Multiple Regression (MR), Neural Network (NN), Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5); all other classifiers that are mostly used in the classification tasks. …”
Get full text
Get full text
Thesis -
16
Vision Based Calibration and Localization Technique for Video Sensor Networks
Published 2009“…The literature is replete with many localization and calibration algorithms that basically rely on some a-priori chosen nodes, called seeds, with known coordinates to help determine the network topology. …”
Get full text
Get full text
Thesis -
17
-
18
Fuzzy C means imputation of missing values with ant colony optimization
Published 2020“…This paper proposes a improved method of imputation by employing a new version of Fuzzy c Means (FCM) which hybridized with Evolutionary Algorithm to handle missing values problem. …”
Get full text
Get full text
Article -
19
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…Furthermore, using the basic features, TLSMalDetect achieved the highest accuracy of 93.69% by Naïve Bayes (NB) among the ML algorithms applied. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Projected majorized-correlation technique for noise filtering and accuracy in orthogonal frequency division multiplexing
Published 2020“…The main objective of this thesis is to develop a new technique for phase noise, accuracy and complexity in OFDM signal. …”
Get full text
Get full text
Thesis
