Search Results - (( java application modified algorithm ) OR ( using negative practice algorithm ))
Search alternatives:
- application modified »
- practice algorithm »
- negative practice »
- java application »
- using negative »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
3
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
4
Nonlinear adaptive algorithm for active noise control with loudspeaker nonlinearity
Published 2014“…The performance of the proposed algorithm is comparable with the benchmark NLFXLMS and superior to the conventional FXLMS with the proposed algorithm.…”
Get full text
Get full text
Thesis -
5
-
6
A Review: Current Trend of Immersive Technologies for Indoor Navigation and the Algorithms
Published 2024“…In these quick analyses, we pull out the most important concepts, article types, rating criteria, and the positives and negatives of each piece. Based on the findings of this review, we can conclude that an efficient solution for indoor navigation that uses the capabilities of embedded data and technological advances in immersive technologies can be achieved by training the shortest path algorithm with a deep learning algorithm to enhance the indoor navigation system.…”
Get full text
Get full text
Get full text
Article -
7
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
8
-
9
-
10
-
11
Classification of labour pain using electroencephalogram signal based on wavelet method / Sai Chong Yeh
Published 2020“…The training and parameters selection of the machine learning algorithms are conducted using EEG data collected from ten subjects in the laboratory. …”
Get full text
Get full text
Get full text
Thesis -
12
Intelligent cooperative web caching policies for media objects based on J48 decision tree and naïve Bayes supervised machine learning algorithms in structured peer-to-peer systems
Published 2016“…Moreover, traditional web caching policies such as Least Recently Used (LRU), Least Frequently Used (LFU), and Greedy Dual Size (GDS) suffer from caching pollution (i.e. media objects that are stored in the cache are not frequently visited which negatively affects on the performance of web proxy caching). …”
Get full text
Get full text
Get full text
Article -
13
An efficient computer forensics selective imaging model
Published 2014“…The evaluation result shows that even if our proposed algorithm has a small efficiency negative impact before the imaging process starts; it has a large positive effect on the efficiency of the selective imaging process itself.…”
Get full text
Get full text
Get full text
Book Section -
14
Sentiment analysis of customer review for Tina Arena Beauty
Published 2025“…Future work may involve expanding the dataset, integrating real-time feedback systems, and evaluating advanced algorithms to improve classification performance further. …”
Get full text
Get full text
Student Project -
15
Intelligent cooperative web caching policies for media objects based on J48 decision tree and Naive bayes supervised machine learning algorithms in structured peer-to-peer systems
Published 2016“…Moreover, traditional web caching policies such as Least Recently Used (LRU), Least Frequently Used (LFU), and Greedy Dual Size (GDS) suffer from caching pollution (i.e. media objects that are stored in the cache are not frequently visited which negatively affects on the performance of web proxy caching). …”
Get full text
Get full text
Get full text
Article -
16
Network bandwidth utilization based on collaborative web caching using machine learning algorithms in peer-to-peer systems for media web objects
Published 2018“…Moreover, traditional web caching policies such as Least Recently Used (LRU) and Least Frequently Used (LFU) suffer from caching pollution (i.e. media objects that are stored in the cache are not frequently visited, which negatively affects on the performance of web proxy caching). …”
Get full text
Get full text
Thesis -
17
Uncovering user perceptions toward digital banks in Indonesia: A Naïve Bayes sentiment analysis of twitter data
Published 2023“…The positive, negative, and neutral sentiments in this study are used to identify business opportunities for digital banks and practical implications for future digital banking services.…”
Get full text
Get full text
Get full text
Article -
18
Change detection on land surface temperature and land use land cover in Jelutong, Jelutong, Perak / Noor Ezlly Shafira Musselihat
Published 2023“…Advanced algorithms were used for LST extraction using Landsat 8 satellite data and Envi software version 5.3, and geospatial techniques were used for land use land cover classification. …”
Get full text
Get full text
Student Project -
19
Motives of sharing fake news and effects on mental health of social media users: a meta-analysis
Published 2024“…This study offers new insights into social media usage from the uses and gratification perspective during health crises, shedding light on its impact on fake news dissemination and suggesting practical algorithmic control measures.…”
Get full text
Get full text
Get full text
Article -
20
Software reusability in green computing / Ibraheem Y. Y. Ahmaro
Published 2013“…Telecommuting is the main green computing approach while algorithmic efficiency, power management, voice over internet protocol (VOIP) and virtualization approaches are also commonly used methods. …”
Get full text
Get full text
Thesis
