Search Results - (( using vector ((does algorithm) OR (drops algorithm)) ) OR ( java application using algorithm ))
Search alternatives:
- java application »
- using algorithm »
- does algorithm »
-
1
Enhanced ontology-based text classification algorithm for structurally organized documents
Published 2015“…This research combines the ontology and text representation for classification by developing five algorithms. The first and second algorithms namely Concept Feature Vector (CFV) and Structure Feature Vector (SFV), create feature vector to represent the document. …”
Get full text
Get full text
Get full text
Thesis -
2
Machine learning methods for herschel-bulkley fluids in annulus: Pressure drop predictions and algorithm performance evaluation
Published 2020“…The impact of each input parameter affecting the pressure drop is quantified using the RF algorithm. © 2020 by the authors.…”
Get full text
Get full text
Article -
3
Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants
Published 2019“…In this study comparing the performance classification techniques of Support Vector Machine (SVM) and C4.5 algorithms. The attributes used consist of Leaves, Stems, and Fruits. …”
Get full text
Get full text
Conference or Workshop Item -
4
The influence of sentiments in digital currency prediction using hybrid sentiment-based Support Vector Machine with Whale Optimization Algorithm (SVMWOA)
Published 2021“…Support Vector Machine (SVM) technique is used with the Whale Optimization Algorithm (WOA) which is inspired by the swarm optimization algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
5
Five phase space vector modulation voltage source inverter using large vector only / Mohd Syazimie Zulkifli
Published 2012“…Furthermore, this study does not include the zero vectors at the time switching and only active vector were used for the time switching for each sector. …”
Get full text
Get full text
Thesis -
6
Investigation of throughput and packet drop for Hata model on VANET using NCTUns simulation software for open area and suburban area / Rosmawani Samsudin
Published 2012“…The investigation was done from 5 to up 20 V ANET nodes. The algorithms considered are Ad-hoc On-demand Distance Vector (AODV) protocol. …”
Get full text
Get full text
Thesis -
7
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
8
Analyzing DNA Sequences Using Clustering Algorithm
Published 2009Get full text
Get full text
Get full text
Thesis -
9
Artificial intelligent power prediction for efficient resource management of WCDMA mobile network
Published 2023“…This artificial intelligent call admission control (CAC) was validated using a dynamic WCDMA mobile network simulator. A few comparative results in downlink have shown that our integrated support vector regression assists genetic algorithm (SVRaGA) is capable of predicting next interval power consumption at Node B with low prediction error and improving the quality of service (QoS) by reducing dropped calls. � 2008 IEICE.…”
Conference Paper -
10
Thematic textual hadith classification: an experiment in rapidminer using support vector machine (SVM) and naïve bayes algorithm
Published 2020“…The classification for this thematic Hadith dataset is implemented using Rapidminer, a machine learning tool using Naïve Bayes and Support Vector Machine (SVM) methods. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
-
12
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
13
Hybrid artificial intelligent algorithm for call admission control in WCDMA mobile network
Published 2023“…The proposed algorithm, support vector regression assists genetic algorithm (SVRaGA) was tested in a dynamic WCDMA mobile network simulator. …”
Conference paper -
14
A new countermeasure to combat the embedding-based attacks on the goldreich-goldwasser-halevi lattice-based cryptosystem
Published 2024“…Consequently, the simplified CVP can be reduced to a Shortest-Vector Problem (SVP) variant which can be solved by using lattice-reduction algorithms such as the LLL algorithm in a shorter amount of time. …”
Get full text
Get full text
Get full text
Article -
15
A new countermeasure to combat the embedding-based attacks on the Goldreich-Goldwasser-Halevi lattice-based cryptosystem
Published 2024“…Consequently, the simplified CVP can be reduced to a Shortest-Vector Problem (SVP) variant which can be solved by using lattice-reduction algorithms such as the LLL algorithm in a shorter amount of time. …”
Get full text
Get full text
Get full text
Article -
16
AntNet: a robust routing algorithm for data networks
Published 2004“…The performance matrix used to compare the algorithms is based on average throughput, packet loss, packet drop and end-to-end delay. …”
Get full text
Get full text
Get full text
Article -
17
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Spacecraft sun-pointing using coplanar solar panels data and magnetic field measurements
Published 2013“…The proposed algorithm has been applied to EgyptSat-1. The satellite is switched from earth-pointing to sun-pointing mode using the estimated sun-vector. …”
Get full text
Get full text
Get full text
Proceeding Paper -
19
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
20
Fuzzy support vector machine based fall detection method for traumatic brain injuries: A new systematic approach of combining fuzzy logic with support vector machine to achieve hig...
Published 2022“…One of the most commonly used algorithms is Support Vector Machine (SVM). …”
Get full text
Get full text
Get full text
Article
