Search Results - (( java implementation 5s algorithm ) OR ( using system using algorithm ))
Search alternatives:
- java implementation »
- implementation 5s »
- using algorithm »
- 5s algorithm »
- using system »
-
1
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…The scheduled cloudlets must be executed efficiently by using the available resources to improve system performance. …”
Review -
2
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023“…Genetic algorithms are powerful optimizing techniques that are used successfully to solve problems in many different disciplines. …”
Conference paper -
3
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The proposed embedded system has achieved positive outcomes in comparison to the current system and the traditional algorithm with regards to the shortest path. …”
Get full text
Get full text
Thesis -
4
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
5
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…The system consist of a central database and organized into web page application which can be accessed by system admin, certificate user, and employer. …”
Get full text
Get full text
Thesis -
6
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
Get full text
Get full text
Get full text
Article -
7
Secure scheme for user authentication and authorization in android environment
Published 2013“…Keeping in viewpoint of security on effective authentication and authorization, this paper proposes a technique that exponentially minimizes the operational cost by using secure hash algorithms that has the potential to generate mobile-based One Time Passwords (OTPs) scheme on Android environment ensuring enhanced protection with respect to password security. …”
Get full text
Get full text
Get full text
Article -
8
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We extracted 30 different features from network traffic. We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
9
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016Get full text
Get full text
Conference or Workshop Item -
10
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Samples data were recorded in the morning before food intake and two hours after food intake using four MQ 2, MQ 5, MQ 6 and MQ 8 sensors, in previously built Electronic Nose prototype system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The Recommender agent then determines the user’s most preferred interest and matches them against other users sharing similar interest. The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis -
12
-
13
-
14
-
15
Smart appointment organizer for mobile application / Mohd Syafiq Adam
Published 2009“…In creating this application, NetBeans IDE 6.5and Java Micro Edition (Java ME) are used. This application can be installing into the mobile phone.…”
Get full text
Get full text
Thesis -
16
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…The support vector machines (SVM) algorithm obtained the overall best results of 94.5% accuracy, 91.8% precision, 91.7% recall, and 91.1% f-Measure while the naïve bayes (NB) algorithm obtained the best AUC score of 0.944 with the tweet data of Dato Seri Anwar. …”
Get full text
Get full text
Get full text
Thesis -
17
An Educational Tool Aimed at Learning Metaheuristics
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Mining association rules from structured XML data
Published 2009Get full text
Get full text
Conference or Workshop Item -
19
Scalable approach for mining association rules from structured XML data
Published 2009Get full text
Get full text
Conference or Workshop Item -
20
