Search Results - (( data application a algorithm ) OR ( java application during algorithm ))
Search alternatives:
- application during »
- data application »
- java application »
- during algorithm »
- application a »
- a algorithm »
-
1
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We used a Drebin data sample, which is a collection of 5,560 applications, as well as clean data sample containing 1,846 applications. …”
Get full text
Get full text
Get full text
Thesis -
2
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…Therefore, replication is a useful technique for distributed systems. It can improve the performance and the reliability of a database application. …”
Get full text
Get full text
Thesis -
3
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
5
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
-
7
-
8
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
9
Workflow optimization in distributed computing environment for stream-based data processing model / Saima Gulzar Ahmad
Published 2017“…Eventually, the workflow is executed. The second algorithm is a variation in first algorithm in which data parallelism is introduced in each partition. …”
Get full text
Get full text
Get full text
Thesis -
10
Development of decentralized data fusion algorithm with optimized kalman filter.
Published 2016“…This thesis proposes a data fusion model that facilitates selection of algorithm and recommends selected algorithm to be optimized. …”
Get full text
Get full text
Thesis -
11
Development of heuristic task scheduling algorithm in cloud computing
Published 2016“…To this direction, in this paper we make a summary of some scheduling algorithms and propose an Enhanced Greedy Heuristic Scheduling Algorithm (EGHSA) for task scheduling adapted for big data applications. …”
Get full text
Get full text
Proceeding Paper -
12
A study of density-grid based clustering algorithms on data streams
Published 2011Get full text
Get full text
Conference or Workshop Item -
13
Data discovery algorithm for scientific data grid environment
Published 2005“…By using this model, we study various discovery algorithms for locating data sets in a data grid system. …”
Get full text
Get full text
Get full text
Article -
14
On density-based data streams clustering algorithms: A survey
Published 2017“…Recently, a lot of density-based clustering algorithms are extended for data streams. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
16
Application of the bees algorithm to the selection features for manufacturing data
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Semantic-k-NN algorithm: An enhanced version of traditional k-NN algorithm
Published 2020“…With the emergence of big data, the performance and the efficiency of the traditional k-NN algorithm is fast becoming a critical issue. …”
Get full text
Get full text
Article -
19
Semantic-k-NN algorithm: An enhanced version of traditional k-NN algorithm
Published 2020“…With the emergence of big data, the performance and the efficiency of the traditional k-NN algorithm is fast becoming a critical issue. …”
Get full text
Get full text
Article -
20
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…This is due to the cryptography operations that include the HMAC and symmetric encryptions. The thesis proposes a new algorithm that provides a significant performance gain in bulk data transfer without compromising the security. …”
Get full text
Get full text
Thesis
