Search Results - (( user validation matching algorithm ) OR ( java application optimization algorithm ))
Search alternatives:
- application optimization »
- validation matching »
- java application »
- user validation »
-
1
Applying empirical thresholding algorithm for a keystroke dynamics based authentication system
Published 2019“…In this paper, a novel algorithm is proposed to authenticate the legal users based on the empirical threshold values. …”
Get full text
Get full text
Get full text
Article -
2
New filtering framework for web personalization search / Anitawati Mohd Lokman and Aishah Ahmad
Published 2012“…Currently, results suggested by search engine don't match user's expectations, which cause frustration to users. …”
Get full text
Get full text
Research Reports -
3
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
4
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
5
An automatic domain independent schema matching in integrating schemas of heterogeneous relational databases
Published 2014“…There are several semi-automatic schema matching algorithms, however these algorithms do not exploit most of the available information related to schemas during the process of schema matching which affects on the accuracy of schema matching result. …”
Get full text
Get full text
Get full text
Article -
6
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
7
Wifi4U: Broadband recommendation system by using rule-based and cosine similarity / Putri Nur Syarfa Maizan
Published 2020“…Meanwhile, based on usability testing, it is validated by 10 users that the system works smoothly and meet their needs. …”
Get full text
Get full text
Thesis -
8
-
9
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
10
Automatic generation of user-defined test algorithm description file for memory BIST implementation
Published 2022“…It can be used by implementing a standard testing algorithm available in the EDA tool library or a user-defined algorithm (UDA). …”
Get full text
Get full text
Get full text
Article -
11
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
12
-
13
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006“…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
Get full text
Get full text
Thesis -
14
Automated tournament management system with dynamic matchmaking using genetic algorithm / Wan Muhammad Aqil Wan Harun
Published 2016“…CTMS are embedded with dynamic match making using genetic algorithm that can pairs players based on variation combination of criteria such as player’s gender, points and nation. …”
Get full text
Get full text
Thesis -
15
-
16
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005“…Genetic Algorithm (GA) is one of the most popular optimization solutions. …”
Get full text
Get full text
Thesis -
17
Collision probability of one-to-many reversible mapping for IPV6 address generation
Published 2012“…Checksum has been used for validation of probability of coincidental match of randomly generated Interface Id or generated by some other mechanism. …”
Get full text
Get full text
Get full text
Proceeding Paper -
18
Characterization of oil palm fruitlets using artificial neural network
Published 2014“…The results also showed that contrary to the widely reported gap between the accuracy of the LM algorithm and other feed forward neural network training algorithms, the RP trained network performed as good as that of the LM algorithm for the range of data considered. …”
Get full text
Get full text
Thesis -
19
-
20
Privacy-preserving multi-keyword hybrid search over encrypted data in cloud
Published 2022“…To validate the opposed approach, simulation analysis has been performed to preserve user-oriented privacy in a cloud environment. …”
Get full text
Get full text
Article
