Search Results - (( java applications learning algorithm ) OR ( using interactive protocol algorithm ))
Search alternatives:
- applications learning »
- interactive protocol »
- learning algorithm »
- protocol algorithm »
- java applications »
-
1
-
2
Deniable authentication protocol based on factoring and discrete logarithm problems
Published 2022“…In terms of communication overhead, the non-interactive protocol is more effective than the interactive protocol. …”
Get full text
Get full text
Conference or Workshop Item -
3
-
4
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
6
Performance analysis of multipath routing based on source routing
Published 2010Get full text
Working Paper -
7
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
8
Vehicular ad-hoc network (vanets) for electrical vehicle charging management
Published 2025text::Thesis -
9
Quality of service performances of three mobile ad hoc network protocols
Published 2009“…The thesis proposed to evaluate the Quality of Service (QoS) performances of three types MANET protocols. The protocols included the Dynamic Source Routing (DSR), Ad Hoc On-demand Distance Vector (AODV) and Temporally Ordered Routing Algorithm (TORA) protocol. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022Get full text
Get full text
Monograph -
11
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
Published 2004“…In particular, important issues such as how smartcard applications can be modeled using UML techniques and how UML can be used to sketch the operations for implementing a secure access using smartcard has been addressed.…”
Get full text
Get full text
Thesis -
12
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…TensorFlow is utilized to integrate machine learning with an Android application. We accomplished asthma therapy using an Android application developed in Java and running on the Android Studio platform.…”
Get full text
Get full text
Get full text
Article -
13
Multipath routing protocol based on cross-layer approach for MANET
Published 2017“…In an effort to improve the performance of MANETs, there has been increased in protocols that rely on cross-layer interaction between different layers. …”
Get full text
Get full text
Get full text
Article -
14
AI powered asthma prediction towards treatment formulation : An android app approach
Published 2022“…TensorFlow is utilized to integrate machine learning with an Android application. We accomplished asthma therapy using an Android application developed in Java and running on the Android Studio platform.…”
Get full text
Get full text
Get full text
Article -
15
-
16
-
17
A comprehensive analysis of surface electromyography for control of lower limb exoskeleton
Published 2016“…The RMSE for both protocols were relatively low varying between 6.88 and 8.31. …”
Get full text
Get full text
Thesis -
18
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
19
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
20
IMPROVING QoS OF VoWLAN VIA CROSS-LAYER BASED ADAPTIVE APPROACH
Published 2013“…Voice over Internet Protocol (VoIP) is a technology that allows the transmission of voice packets over Internet Protocol (IP). …”
Get full text
Get full text
Thesis
