Search Results - (( risk communication using algorithm ) OR ( java data virtualization algorithm ))
Search alternatives:
- virtualization algorithm »
- communication using »
- data virtualization »
- risk communication »
- using algorithm »
- java »
-
1
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
-
3
CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK
Published 2023“…The designated algorithm is tested with Multi-Protocol Label Switching (MPLS) protocol using Network Simulator 3 (NS-3) as a simulation platform. …”
text::Thesis -
4
The significant effect of feature selection methods in spam risk assessment using dendritic cell algorithm
Published 2024conference output::conference proceedings::conference paper -
5
The Significant Effect of Feature Selection Methods in Spam Risk Assessment Using Dendritic Cell Algorithm
Published 2024Proceedings Paper -
6
-
7
Diagnosing Metabolic Syndrome Using Genetically Optimised Bayesian ARTMAP
Published 2019“…We use the GOBAM algorithm to classify individuals as either being at risk of MetS or not at risk of MetS with a related posterior probability, which ranges between 0 and 1. …”
Get full text
Get full text
Article -
8
-
9
Computational intelligence approach for classification and risk quantification of metabolic syndrome / Habeebah Adamu Kakudi
Published 2019“…Genetic Algorithm(GA) is used to optimize the order of sequence of the input sample and the parameters of the Bayesian ARTMAP (BAM). …”
Get full text
Get full text
Get full text
Thesis -
10
-
11
Unified framework for spam detection and risk assessment in short message communication media / Adewole Kayode Sakariyah
Published 2018“…Four levels of risk were employed with their corresponding response strategies used to map risk levels into different types of response. …”
Get full text
Get full text
Get full text
Thesis -
12
Rogue access point detection and tracking system using trilateration algorithm
Published 2023Get full text
Get full text
Book Section -
13
Text spam messages classification using Artificial Immune System (AIS) algorithms
Published 2024thesis::master thesis -
14
Selection of prospective workers using profile matching algorithm on crowdsourcing platform
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
16
Whale optimization algorithm strategies for higher interaction strength t-way testing
Published 2022“…Combinatorial testing (CT) can be used in this case to reduce risks and ensure conformance to specifications. …”
Get full text
Get full text
Get full text
Article -
17
-
18
Digital Framing and Reputation Crisis: A TikTok Framing Analysis of the Yai Mim–Sahara Case in the Context of Communication
Published 2026journal-article -
19
-
20
A comparative analysis of predicting heart disease using machine learning algorithms
Published 2026Get full text
Get full text
Get full text
Conference or Workshop Item
