Search Results - (( variable operation mining algorithm ) OR ( java applications cloud algorithm ))
Search alternatives:
- variable operation »
- applications cloud »
- java applications »
- operation mining »
- mining algorithm »
- cloud algorithm »
-
1
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
3
Exploratory analysis with association rule mining algorithms in the retail industry / Alaa Amin Hashad ... [et al.]
Published 2024“…In the context of mining frequent item sets, many methods have been proposed to push various kinds of limitations inside the most well-known algorithms. …”
Get full text
Get full text
Article -
4
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The approach of the mobile cloud is clearly occurring with web host servers expands thus large number of data around the world stored in huge servers, consumers of mobile devices and small computing devices have high performance expectations usually, therefore mobile cloud computing theorizes that the cloud will soon become a disruptive force in the mobile world, eventually becoming the dominant way in which mobile applications operates. …”
Get full text
Get full text
Thesis -
5
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023“…The authors then demonstrate the operation of the algorithm by testing it on a typical scenario and analyse the results on several issues. …”
Short Survey -
6
-
7
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2013“…The authors then demonstrate the operation of the algorithm by testing it on a typical scenario and analyse the results on several issues.…”
Get full text
Get full text
Article -
8
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
9
Improvement on rooftop classification of worldview-3 imagery using object-based image analysis
Published 2019“…Then, the classifier (support vector machine (SVM) and data mining (DM) algorithm, decision tree (DT) were applied on each fusion image and their accuracy were evaluated. …”
Get full text
Get full text
Thesis -
10
Identification of debris flow initiation zones using topographic model and airborne laser scanning data
Published 2017“…MARSpline multivariate data mining predictive approach was implemented using morphometric indices and topographical derived parameter as independent variables. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
Machine-learning approach using thermal and synthetic aperture radar data for classification of oil palm trees with basal stem rot disease
Published 2021“…The machine learning algorithm consistently performs well when presented with a well-balanced dataset. …”
Get full text
Get full text
Thesis
