Search Results - (( java application optimized algorithm ) OR ( software identification tree algorithm ))
Search alternatives:
- software identification »
- optimized algorithm »
- identification tree »
- java application »
- tree algorithm »
-
1
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
2
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
3
Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Article -
4
Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Thesis -
5
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
6
-
7
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
8
Detection and classification of conflict flows in SDN using machine learning algorithms
Published 2021“…Moreover, applying machine learning algorithms in the identification and classification of conflicting flows has limitations. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
9
-
10
-
11
Crown counting and mapping of missing oil palm tree using airborne imaging system
Published 2019“…The oil palm tree counting from eCognition software provides the average counting accuracy of 90.3%. …”
Get full text
Get full text
Thesis -
12
Data mining approach to herbs classification
Published 2018Get full text
Get full text
Get full text
Article -
13
Keylogger detection analysis using machine learning algorithm / Muhammad Faiz Hazim Abdul Rahman
Published 2022“…Besides, to test the accuracy of detection models on keylogger dataset comparing two machine learning algorithms. This study is carried out through the utilisation of two machine learning techniques, namely Decision Tree and Naive Bayes, on Jupyter Notebook in order to conduct an analysis of the Keylogger Detection dataset obtained from a trustworthy website known as Kaggle. …”
Get full text
Get full text
Student Project -
14
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
15
-
16
Determination of tree stem volume : A case study of Cinnamomum
Published 2013“…Modelling of trees has attracted scientific research in various fields and disciplines since trees and forests play very important roles in the global system. …”
Get full text
Get full text
Get full text
Thesis -
17
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006“…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
Get full text
Get full text
Thesis -
18
-
19
Detecting Malware with Classification Machine Learning Techniques
Published 2023“…—In today's digital landscape, the identification of malicious software has become a crucial undertaking. …”
Get full text
Get full text
Get full text
Article -
20
Detecting Malware with Classification Machine Learning Techniques
Published 2023“…In today's digital landscape, the identification of malicious software has become a crucial undertaking. …”
Get full text
Get full text
Article
