Search Results - (( java automatic optimization algorithm ) OR ( using internet application algorithm ))
Search alternatives:
- automatic optimization »
- application algorithm »
- internet application »
- using internet »
- java »
-
1
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…Hence, the objective of this research is to propose suitable and optimize algorithm for ANPR system on Android mobile phone. …”
Get full text
Get full text
Get full text
Book -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
3
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
4
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop
Published 2016“…The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
Get full text
Get full text
Thesis -
5
-
6
Real-time Traffic Classification Algorithm Based on Hybrid of Signature Statistical and Port to Identify Internet Applications
Published 2014“…Based on certain priority rules, SSPC makes classification decisions for each flow. The SSPC algorithm was used to classifying four types of Internet applications in two stages, initially offline and later online. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Algorithm for the legal regulation of internet financial crime
Published 2024“…Further research is proposed to delve deeper into the application of these algorithms in real-world scenarios and explore additional methods to enhance the prevention and management of Internet financial crime.…”
Get full text
Get full text
Get full text
Article -
8
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…The Internet Protocol Security (IPSec) is a standard-based method that being used to protect the information that traverse in the Internet networking without expensive cost or complex modification on Internet application itself. …”
Get full text
Get full text
Conference or Workshop Item -
9
-
10
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016“…The search algorithm is a crucial part in any internet applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution: article / Nor Azura Ayop
Published 2016“…The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
Get full text
Get full text
Article -
12
-
13
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
Published 2006“…As the Internet grows and becomes universally available, it becomes very important to deal with real time service delivery to application such as IP telephony. …”
Get full text
Get full text
Thesis -
14
Intelligent Multi-cellular Network Connectivity for Internet of Things Applications
Published 2023Conference Paper -
15
Intelligent DNA signature detection for internet worms
Published 2011Get full text
Get full text
Get full text
Get full text
Monograph -
16
A new fair marker algorithm for DiffServ networks
Published 2008“…The paper design and implement the algorithm with extensive simulations using NS-2 simulator to compare the proposed algorithm with previous algorithms. …”
Get full text
Get full text
Article -
17
-
18
-
19
-
20
