Search Results - (( java implementation some algorithm ) OR ( using access using algorithm ))
Search alternatives:
- java implementation »
- implementation some »
- using algorithm »
- some algorithm »
- access using »
-
1
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
Get full text
Get full text
Get full text
Book -
2
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
3
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
4
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
5
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
6
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
7
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
8
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
9
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
10
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
11
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
12
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Orthogonal Frequency Division Multiple Access resource unit allocation algorithms for IEEE 802.11AX medium access control protocol
Published 2024“…The final proposed idea is the Effectual Contention Window (ECW) Computation that makes CW size adaptable by applying the modulo operation to available RUs, enhancing channel access efficiency. Extensive Discrete Event Simulation (DES) has been used as a quantitative research tool to evaluate these algorithms using the following metrics: average throughput, collision probability, channel efficiency, and average channel access delay. …”
Get full text
Get full text
Get full text
Thesis -
14
Rogue access point detection and tracking system using trilateration algorithm
Published 2023“…On this basis, the concept of mitigating the threat of rogue access point attacks using the proposed approach may be considered when designing a framework to mitigate the rogue access point in tertiary institutions.…”
Get full text
Get full text
Book Section -
15
Least congested channel recommendation for uncoordinated WiFi access point / Ag Ibrahim Ag Daud
Published 2017“…All ten access point model used in the experiment are currently supplied by TM to the customers.…”
Get full text
Get full text
Thesis -
16
Efficient multi-cloud storage using online dynamic replication and placement algorithms for online social networks
Published 2024“…The DTS algorithm establishes the replication and placement of objects using deterministic time slots, while the RTS algorithm is based on randomized time slots. …”
Get full text
Get full text
Article -
17
Efficient Multi-Cloud Storage Using Online Dynamic Replication and Placement Algorithms for Online Social Networks
Published 2024journal::journal article -
18
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…A set of algorithms is used for mining user access behavior, preprocessing tasks for data preparation, association rules for defining the rules that describe the correlation between web user access transaction entries patterns, and sequential pattern discovery for finding the sequences of the web user access transaction entries pattern using Prefixspan (Pattern growth via frequent sequence lattice) algorithms. …”
Get full text
Get full text
Thesis -
19
A fault syndromes simulator for random access memories
Published 2008“…At present, the March test algorithm is used to detect and diagnose all faults related to Random Access Memories. …”
Get full text
Get full text
Article -
20
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…This automated generator will facilitate NPSF analysis as manual fault analysis is no longer practical due to increasing memory size. The algorithms used in this generator are based on March algorithm. …”
Get full text
Get full text
Thesis
