Search Results - (( knowledge internet application algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- application algorithm »
- internet application »
- knowledge internet »
- java application »
-
1
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
3
Document clustering for knowledge discovery using nature-inspired algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
4
-
5
Sentiment mining using immune network algorithm /Raja Muhammad Hafiz Raja Kamarudin
Published 2012“…With the abundant of knowledge accessible via Internet and the likes, many have ventured into using that knowledge in order to understand deeply on how the available knowledge affected the whole world directly or indirectly. …”
Get full text
Get full text
Thesis -
6
Evolutionary Algorithms In Auction Models Of Service Procurement
Published 2019Get full text
Get full text
Thesis -
7
A framework of rough cultural algorithms in optimizing mobile web caching performance
Published 2007“…Simultaneously, Cultural Algorithms (CA) will be exploited to optimize the performance of proxy caching in accumulating the knowledge between each generation. …”
Get full text
Get full text
Article -
8
An investigation of scheduling and packet reordering algorithms for bandwidth aggregation in heterogeneous wireless networks
Published 2013“…There are some Internet applications that require high bandwidth and therefore, the bandwidth of an individual interface need to be aggregated to form a high speedy logical link. …”
Get full text
Get full text
Get full text
Article -
9
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Security analysis of data transmission in an IoT based platform for telemedicine
Published 2021“…The Internet of Things offers an effective and increased job satisfaction when used for better services on the Internet. …”
Get full text
Get full text
Get full text
Article -
11
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
12
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…This huge amount of data can be a useful source of knowledge. Advanced mining processes are needed for this knowledge to be extracted, understood and used. …”
Get full text
Get full text
Article -
13
-
14
Combination of GREEN and SHRed AQM for short-lived traffic
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Cyber fraud profiling with routine activity theory using data mining techniques / Sunardi, Abdul Fadlil and Nur Makkie Perdana Kusuma
Published 2023“…Cyber-fraud profiling based on RAT with Naïve Bayes Algorithm yields the following findings: Potential Offender Elements: Male, using Facebook, WhatsApp, and Instagram, and crime scene region in Special Capital Region of Jakarta; Elements Suitable Target: Female, using Instagram, WhatsApp, and Facebook, living in the Special Region of Yogyakarta, spending time on the internet more than 8 hours a day, and have more than three IM applications; and Guardianship: Lack of knowledge about Cyber Fraud.…”
Get full text
Get full text
Article -
16
Routing A ware Distributed Service Discovery Architecture with Intelligent Message Routing
Published 2012“…Most of the current DSD approaches follow the techniques used in Peer to Peer (P2P) applications. It is estimated that 70% of the Internet traffic today is consumed by these P2P applications. …”
Get full text
Get full text
Thesis -
17
HybridFlood: minimizing the effects of redundant messages and maximizing search efficiency of unstructured peer-to-peer networks
Published 2014“…Peer-to-peer systems are important Internet applications. A major portion of Internet traffic belongs to such applications. …”
Get full text
Get full text
Get full text
Article -
18
Enhancing problem-solving skills of novice programmers in an introductory programming course
Published 2023Article -
19
The Rise of Blockchain Internet of Things (BIoT): Secured, Device-to-Device Architecture and Simulation Scenarios
Published 2022“…As a result, to deliver acceptable services, a new solution is necessary to secure data accountability, increase data privacy and accessibility, and extract hidden patterns and usable knowledge. Moving the Internet of Things to a distributed ledger system might be the most effective way to solve these issues. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
