Search Results - (( java application optimisation algorithm ) OR ( share information method algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- information method »
- share information »
- java application »
- method algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Multiview Laplacian semisupervised feature selection by leveraging shared knowledge among multiple tasks
Published 2019“…Recently, considerable advancement has been achieved in semisupervised multitask feature selection methods, which they exploit the shared information from multiple related tasks. …”
Get full text
Get full text
Article -
3
-
4
Shamir secret sharing scheme using newton divided difference interpolati / Md Nizam Udin … [et al.]
Published 2017“…Rivest, Shamir and Adlemen Algorithm or commonly known as RSA Cryptography proposed in the year 1978 to secure confidential information. …”
Get full text
Get full text
Book Section -
5
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
6
Enhance efficiency of answering XML keyword query using incompact structure of MCCTree
Published 2012“…If the result cannot be used directly by the ranking method, the algorithm has an ineffective process. …”
Get full text
Get full text
Thesis -
7
-
8
-
9
Constructing an information matrix for multivariate DCC-MGARCH (1, 1) method
Published 2018Get full text
Get full text
Indexed Article -
10
Image Retrieval System (RGB)
Published 2005“…In this project, histogram-based search method is investigated in RGB color space. Histogram search characterizes an image by its color distribution but the drawback of a global histogram representation is that information about object location, shape and texture is discarded. …”
Get full text
Get full text
Final Year Project -
11
Meta-scheduler in Grid environment with multiple objectives by using genetic algorithm
Published 2006“…This paper proposes and evaluates a new method for job scheduling in heterogeneous computing Systems. …”
Get full text
Article -
12
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
Get full text
Get full text
Thesis -
13
Resource management algorithms for wavelength division multiplexing optical metro slotted ring networks
Published 2012“…The performance of the optical packet ring is highly dependent on the method of resource sharing deployed. In addition, the increase in demand of bandwidth by web applications relying on multicasting has made optical fibers a preferred solution. …”
Get full text
Get full text
Thesis -
14
Secure encryption in network using Data Encryption Standard (DES) for high security transmission
Published 2017“…The Data Encryption Standard (DES) algorithm is a symmetric key algorithm for the encryption of electronic and allowed for information. …”
Get full text
Get full text
Student Project -
15
-
16
-
17
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
18
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Thus, proposing the method of reestimating the dropping functions in the RED algorithm. …”
Get full text
Get full text
Thesis -
19
Determinants to knowledge transfer and sharing in multimedia super corridor in Malaysia : the mediating role of trust
Published 2016“…Partial Least Squares Method (PLS) algorithm and bootstrap techniques were used to test the hypotheses. …”
Get full text
Get full text
Get full text
Thesis -
20
Secret sharing scheme for key management of secure data sharing in cloud
Published 2019“…This problem can be overcome by using cryptography uses a single key, but another problem will arises is the potential for a single point of vulnerability if the key fell in the hands of unauthorized persons, then the whole secret and information can be compromised. The objectives of this study were to execute and analyze key generation times for large-scale users using the AES-256 method and Shamir's Secret Sharing Scheme, which both are still using a single key concept and prove Shamir’s Secret Sharing Scheme is more suitable for large-scale users. …”
Get full text
Get full text
Thesis
