Search Results - (( java implementation case algorithm ) OR ( using access using algorithm ))
Search alternatives:
- java implementation »
- implementation case »
- using algorithm »
- case algorithm »
- access using »
-
1
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
2
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Secondly, an expert system using Java programming technology with two tiers of search engine was developed to perform a fast selection of candidate materials in huge volume. …”
Get full text
Get full text
Thesis -
3
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
4
-
5
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
7
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article -
8
-
9
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
10
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
12
Visualisation tool to study malaria transmission using network modelling
Published 2014“…Java was used to implement the visualisation tool. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
13
Orthogonal Frequency Division Multiple Access resource unit allocation algorithms for IEEE 802.11AX medium access control protocol
Published 2024“…The final proposed idea is the Effectual Contention Window (ECW) Computation that makes CW size adaptable by applying the modulo operation to available RUs, enhancing channel access efficiency. Extensive Discrete Event Simulation (DES) has been used as a quantitative research tool to evaluate these algorithms using the following metrics: average throughput, collision probability, channel efficiency, and average channel access delay. …”
Get full text
Get full text
Get full text
Thesis -
14
Rogue access point detection and tracking system using trilateration algorithm
Published 2023“…On this basis, the concept of mitigating the threat of rogue access point attacks using the proposed approach may be considered when designing a framework to mitigate the rogue access point in tertiary institutions.…”
Get full text
Get full text
Book Section -
15
Least congested channel recommendation for uncoordinated WiFi access point / Ag Ibrahim Ag Daud
Published 2017“…All ten access point model used in the experiment are currently supplied by TM to the customers.…”
Get full text
Get full text
Thesis -
16
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
17
Efficient multi-cloud storage using online dynamic replication and placement algorithms for online social networks
Published 2024“…The DTS algorithm establishes the replication and placement of objects using deterministic time slots, while the RTS algorithm is based on randomized time slots. …”
Get full text
Get full text
Article -
18
Efficient Multi-Cloud Storage Using Online Dynamic Replication and Placement Algorithms for Online Social Networks
Published 2024journal::journal article -
19
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…A set of algorithms is used for mining user access behavior, preprocessing tasks for data preparation, association rules for defining the rules that describe the correlation between web user access transaction entries patterns, and sequential pattern discovery for finding the sequences of the web user access transaction entries pattern using Prefixspan (Pattern growth via frequent sequence lattice) algorithms. …”
Get full text
Get full text
Thesis -
20
A fault syndromes simulator for random access memories
Published 2008“…At present, the March test algorithm is used to detect and diagnose all faults related to Random Access Memories. …”
Get full text
Get full text
Article
