Search Results - (( simulation identification mining algorithm ) OR ( java application modified algorithm ))
Search alternatives:
- simulation identification »
- identification mining »
- application modified »
- mining algorithm »
- java application »
-
1
A prototype for context identification of scientific papers via agent-based text mining
Published 2023Conference Paper -
2
Discretization of integrated moment invariants for writer identification
Published 2008“…Mathematical proving and results of computer simulations are embraced to attest the feasibility of the proposed technique in Writer Identification. …”
Get full text
Get full text
Conference or Workshop Item -
3
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
4
-
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
6
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
7
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
8
-
9
Single input fuzzy logic controller for yaw control of underwater remotely operated crawler
Published 2018“…This research has discussed and compared the performance of PID, FLC and SIFLC. The algorithm is verified in MATLAB/Simulink software. …”
Get full text
Get full text
Get full text
Get full text
Thesis
