Search Results - (( based applications usage algorithm ) OR ( some applications new algorithm ))
Search alternatives:
- based applications »
- applications usage »
- some applications »
- applications new »
- usage algorithm »
- new algorithm »
-
1
Achieving security by combining Huffman and SLSB algorithms
Published 2013Get full text
Get full text
Get full text
Article -
2
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…But the major treat of the IPSec is caused by the usage or the algorithm that has weak keys. The algorithms are DES, 3DES, Blowfish, Cast128 and RC5. …”
Get full text
Get full text
Conference or Workshop Item -
3
Noise Cancellation using Selectable Adaptive Algorithm for Speech in Variable Noise Environment
Published 2017“…The usage of such methods can be impractical for many real time applications, where speed of convergence and processing time are critical. …”
Get full text
Get full text
Get full text
Article -
4
Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar
Published 2007“…Through the algorithm, rule-based technique was used. Based on the experiment results, it is proved that the video content adaptation under e-learning environment can be achieved by the algorithms effectively.…”
Get full text
Get full text
Thesis -
5
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…Furthermore, some analyses on hiding quality show that our algorithm retains the cover image quality as high as that of standard LSB algorithm. …”
Get full text
Get full text
Get full text
Thesis -
6
Optimizing tree planting areas through integer programming and improved genetic algorithm
Published 2012“…The algorithmic solution with some strategies mainly focuses on efficiency. …”
Get full text
Get full text
Thesis -
7
-
8
A new mobile malware classification for call log exploitation
Published 2024journal::journal article -
9
Ranking trapezoidal fuzzy numbers based on set theoretic indices with Hurwicz criterion / Nazirah Ramli
Published 2003“…This study investigates on the development of the NRI and based on that, two observations and three algorithms are created. …”
Get full text
Get full text
Book Section -
10
-
11
Inexact discretionary inputs in data envelopment analysis
Published 2013Get full text
Get full text
Get full text
Book Section -
12
Simulation analysis for maximizing renewable solar energy to improve the power generation capacity in the state of Kuwait
Published 2018“…This paper aims to present how to improve power generation capacity in the State of Kuwait through simulation analysis for maximizing the usage of renewable energy applications. Power demand in Kuwait increases every year by 6% that causes load-shedding problems in the national utility grid system. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…To provide online prediction efficiently, we advance an architecture for online predicting in Web Usage Mining system and propose a novel approach based on LCS algorithm for classifying user navigation patterns for predicting users' future requests. …”
Get full text
Get full text
Article -
14
-
15
-
16
-
17
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…E-Learning is one of the Web based application where it will facing with large amount of data. …”
Get full text
Get full text
Get full text
Thesis -
18
Dynamic modeling by usage data for personalization systems
Published 2009Get full text
Get full text
Conference or Workshop Item -
19
Web usage mining for UUM learning care using association rules
Published 2004“…E-Leaming is one of the Web based application where it will facing with large amount of data. …”
Get full text
Get full text
Thesis -
20
