Search Results - (( usage intention method algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- application matching »
- intention method »
- method algorithm »
- java application »
-
1
-
2
-
3
-
4
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
5
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Detection of multiple mangoes using histogram of oriented gradient technique in aerial monitoring
Published 2016“…As a result, the rate of production and the structure of the tree will be dampening. Hence, usage of image processing algorithm could be a solution for a better and more precise mango’s pre-harvesting process. …”
Get full text
Get full text
Get full text
Article -
7
Kernel methods and support vector machines for handwriting recognition
Published 2023“…This paper presents a review of kernel methods in machine learning. The support vector machine (SVM) as one of the methods in machine learning to make use of kernels is first discussed with the intention of applying it to handwriting recognition. …”
Conference paper -
8
-
9
An efficient unknown detection approach for RFID data stream management system
Published 2025“…This research addresses the critical issue of detecting unknown tags, focusing on optimizing processing time and energy efficiency in terms of memory usage when detecting these tags. A novel algorithm called SWOR (Sliding Window XOR-based Detection) is introduced, specifically designed to identify unknown tags within RFID data streams. …”
Get full text
Get full text
Get full text
Article -
10
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis
