Search Results - (( using major issues algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- issues algorithm »
- java application »
- using major »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
2
Enhancing Solutions Of Capacity Vehicle Routing Problem Based On An Improvement Ant Colony System Algorithm
Published 2019“…VRP is one of the major important issues have no perfect solutions yet. …”
Get full text
Get full text
Get full text
Article -
3
Performance enhancement of AIMD algorithm for congestion avoidance and control
Published 2011“…The results have shown improvement in all aspects particularly the major ones, efficiency and fairness over the previous algorithms.…”
Get full text
Get full text
Thesis -
4
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
Get full text
Get full text
Thesis -
5
Optimized routing algorithm for mobile multicast source in Wireless Mesh Networks
Published 2015“…Mobility considerations in multicast algorithm design usually focus issues of mobile receivers while few researches emphasize on mobile multicast sources issues. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
-
7
Credit Card Fraud Detection Using AdaBoost and Majority Voting
Published 2018“…Standard models are first used. Then, hybrid methods which use AdaBoost and majority voting methods are applied. …”
Get full text
Get full text
Article -
8
Primitive structural method for high capacity text steganography
Published 2014“…We propose a Primitive Structural algorithm for Arabic text steganography to encounter this issue. …”
Get full text
Get full text
Article -
9
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003“…From the analysis done, it shows that the security level is high even though keys that are found to be weak keys for Baker’s map algorithm are being used in the algorithm. …”
Get full text
Get full text
Article -
10
MYMealPal: Malaysian healthy meal planner using artificial bee colony approach / Wan Muhamad Amirul Hakimi Wan Mohd Zaki
Published 2017“…It is crucial to maintain a healthy diet especially for people who are having a weight issues such as obese, overweight or underweight. Controlling daily calories intake is considered as a major solution to these issues. …”
Get full text
Get full text
Student Project -
11
Traffic signal optimization using cultural algorithm
Published 2022“…Traffic congestion is one of the major issues in most cities. Over time, traffic congestion is increasing due to the increasing number of road users. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
12
Determining the graduates employability using data analytics model
Published 2023“…All data preparation and modeling are done using the Weka tool. The result shows that the majority of graduates are employed, whereas only 10% are unemployed. …”
Get full text
Get full text
Get full text
Article -
13
Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions
Published 2024“…Furthermore, the taxonomy was used to evaluate the most recent machine learning algorithm and analysis. …”
Article -
14
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions
Published 2023“…Major offloading-related issues in MEC are investigated, and the taxonomy of journal papers based on adopted approaches is presented. …”
Get full text
Get full text
Article -
15
Protovoltaic boost DC/DC converter with adaptive perturb and observe-fuzzy maximum power point tracking algorithm
Published 2013“…Boost dc-dc converter is used with maximum power point tracking algorithm to operate at desired voltage level. …”
Get full text
Get full text
Thesis -
16
Development of cell formation algorithm and model for cellular manufacturing system
Published 2011“…The performance of the proposed algorithm is compared with a number of key algorithms that reported in the corresponding scientific literature. …”
Get full text
Get full text
Thesis -
17
Image encryption algorithm based on chaotic mapping
Published 2003“…With the increasing use of digital techniques for transmitting and storing images, the fundamental issue of protecting the confidentiality, integrity as well as the authenticity of images has become a major concern. …”
Get full text
Get full text
Get full text
Article -
18
Comparison of supervised machine learning algorithms for malware detection / Mohd Faris Mohd Fuzi ... [et al.]
Published 2023“…With the advancement of malware analysis, Machine Learning (ML) is increasingly being used to detect malware. This study's major objective is to compare the best-supervised ML algorithms for malware detection based on detection accuracy. …”
Get full text
Get full text
Get full text
Article -
19
Parameter estimation of cocomo model using the jaya algorithm for software cost estimation
Published 2019“…Estimate of the software development costs can be a major issue (i.e. in terms of determining the actual development costs). …”
Get full text
Get full text
Undergraduates Project Papers -
20
Reduced Galloping Column Algorithm For Memory Testing
Published 2015“…There are lots of memory algorithms used for memory testing, including the galloping column algorithm (GalCol). …”
Get full text
Get full text
Thesis
