Search Results - (( messaging application tree algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1
  2. 2
  3. 3

    An efficient scalable batch-rekeying scheme for secure multicast communication using multiple logical key trees by Zakaria, Omar, Hassan Abdalla Hashim, Aisha, Hassan, Wan Haslina

    Published 2014
    “…In this paper, a new scheme based on multiple key trees is proposed. Instead of using only a single key tree multiple key trees are used and at the end of each batch time the algorithm decides which tree will be used to update the keys. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Cyberbullying detection: a machine learning approach by Yeong, Su Yen

    Published 2022
    “…The machine learning algorithm, Support Vector Machine was chosen after comparing it with other algorithms such as Multinomial Naïve Bayes, Decision Tree Classifier, and Random Forest Classifier. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Enhancing a cluster-based TDMA MAC protocol for vehicle-to-vehicle communications / Abubakar Bello Tambawal by Abubakar Bello , Tambawal

    Published 2020
    “…A dynamic time slot allocation strategy using a binary tree algorithm has been proposed to prevent vehicles from the adjacent clusters to reserve the same time slot. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Energy-aware task scheduling for streaming applications on NoC-based MPSoCs by Abd Ishak, Suhaimi Abd Ishak, Wu, Hui, Tariq, Umair Ullah

    Published 2024
    “…Our approach is supported by a set of novel techniques, which include constructing an initial schedule based on a list scheduling where the priority of each task is its approximate successor-tree-consistent deadline such that the workload across all the processors is balanced, a retiming heuristic to transform intraperiod dependencies into inter-period dependencies for enhancing parallelism, assigning an optimal discrete frequency for each task and each message using a Non-Linear Programming (NLP)-based algorithm and an Integer-Linear Programming (ILP)-based algorithm, and an incremental approach to reduce the memory usage of the retimed schedule in case of memory size violations. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
    Get full text
    Get full text
    Article
  12. 12