Search Results - (( java implementation 5s algorithm ) OR ( using network using algorithm ))
Search alternatives:
- java implementation »
- implementation 5s »
- using algorithm »
- 5s algorithm »
-
1
Secure scheme for user authentication and authorization in android environment
Published 2013“…Keeping in viewpoint of security on effective authentication and authorization, this paper proposes a technique that exponentially minimizes the operational cost by using secure hash algorithms that has the potential to generate mobile-based One Time Passwords (OTPs) scheme on Android environment ensuring enhanced protection with respect to password security. …”
Get full text
Get full text
Get full text
Article -
2
-
3
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
4
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016Get full text
Get full text
Conference or Workshop Item -
5
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The Recommender agent then determines the user’s most preferred interest and matches them against other users sharing similar interest. The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis -
6
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…A 5-fold cross-validation testing was implemented for classification results analysis. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
-
8
-
9
-
10
-
11
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
12
-
13
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. This application can be installing into the mobile phone.…”
Get full text
Get full text
Thesis -
14
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The support vector machines (SVM) algorithm obtained the overall best results of 94.5% accuracy, 91.8% precision, 91.7% recall, and 91.1% f-Measure while the naïve bayes (NB) algorithm obtained the best AUC score of 0.944 with the tweet data of Dato Seri Anwar. …”
Get full text
Get full text
Get full text
Thesis -
15
An Educational Tool Aimed at Learning Metaheuristics
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Routing performance enhancement in hierarchical torus network by link-selection algorithm
Published 2005“…We find that the dynamic communication performance of an HTN using the link-selection algorithm is better than when the dimension-order routing algorithm is used.…”
Get full text
Get full text
Get full text
Article -
17
Network reconfiguration and control for loss reduction using genetic algorithm
Published 2010“…Two selection methods that are used in Genetic Algorithm are the roulette wheel and tournament selections. …”
Get full text
Get full text
Thesis -
18
Mining association rules from structured XML data
Published 2009Get full text
Get full text
Conference or Workshop Item -
19
Scalable approach for mining association rules from structured XML data
Published 2009Get full text
Get full text
Conference or Workshop Item -
20
Adaptive routing algorithms and implementation for TESH network
Published 2013“…It is found that the communication performance of a TESH network using these adaptive algorithms is better than when the dimension-order routing algorithm is used.…”
Get full text
Get full text
Get full text
Article
