Search Results - (( data implication from algorithm ) OR ( java application among algorithm ))
Search alternatives:
- application among »
- data implication »
- implication from »
- java application »
- among algorithm »
- from algorithm »
-
1
-
2
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
3
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
Get full text
Get full text
Final Year Project -
4
Group formation using genetic algorithm
Published 2009Get full text
Get full text
Get full text
Get full text
Monograph -
5
Network game (Literati) / Chung Mei Kuen
Published 2003“…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
Get full text
Get full text
Thesis -
6
-
7
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. The proposed method can be applied in smart cities, monitoring, health delivery, augmented reality, and gaming among others.…”
Get full text
Get full text
Article -
8
-
9
Using predictive analytics to solve a newsvendor problem / S. Sarifah Radiah Shariff and Hady Hud
Published 2023“…The best algorithm will not be the same for all the data sets. …”
Get full text
Get full text
Book Section -
10
Application Of Bibliometric Analysis on Root Growth Algorithm
Published 2024“…An article reviewed and analyzed bibliographic data on metaheuristics but is not specific on the topic of root growth algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Malware Classification and Detection using Variations of Machine Learning Algorithm Models
Published 2025“…Types of attacks can be Ping of Death, flooding, remote-controlled attacks, UDP flooding, and Smurf Attacks. Attack data was obtained from the ClaMP dataset, which has an unbalanced data set, and has very high noise, so it is necessary to analyze data packets in network logs and optimize feature extraction which is then analyzed statistically with machine learning algorithms. …”
Get full text
Get full text
Get full text
Article -
12
Batch mode heuristic approaches for efficient task scheduling in grid computing system
Published 2016“…In ELB algorithm, the tasks are distributed among resources based on their execution time range. …”
Get full text
Get full text
Get full text
Thesis -
13
Network monopoly / Tan Kean Yeap
Published 2002“…The possible applications of multimedia-networked system are endless, as the demand to supoort interactive communication among groups of users has increased significantly. …”
Get full text
Get full text
Thesis -
14
Algoritma pendaraban nombor perpuluhan dari perspektif pelajar Tingkatan Satu
Published 2001“…This study discusses the algorithms in multiplication involving decimal numbers from the perspectives of Form One students. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Algorithms for moderating effect of emotional value from a cross-media data fusion perspective: a case study of Chinese dating reality shows
Published 2026“…Preprocessing removes noise from text data, normalizes sentiment word lists and undertakes temporal transformation. …”
Get full text
Get full text
Article -
17
A Method for Mapping XML DTD to Relational Schemas In The Presence Of Functional Dependencies
Published 2008“…To approach the mapping problem, three different components are explored: the mapping algorithm, functional dependency for XML, and implication process. …”
Get full text
Get full text
Thesis -
18
-
19
-
20
Age detection from face using Convolutional Neural Network (CNN) / Hanin Hanisah Usok @ Yusoff
Published 2024“…Following a thorough examination of numerous algorithms, CNN was determined to be the best effective method for age recognition from facial features due to its ability to automatically extract important data. …”
Get full text
Get full text
Thesis
