Search Results - (( data selection ((method algorithm) OR (max algorithm)) ) OR ( java application use algorithm ))
Search alternatives:
- method algorithm »
- java application »
- application use »
- data selection »
- max algorithm »
- use algorithm »
-
1
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
Get full text
Get full text
Article -
2
Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia
Published 2015“…Then, a multi criteria with two-threshold algorithm is proposed to prioritize the selection between the LTE and WiMAX as target technologies. …”
Get full text
Get full text
Thesis -
3
Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks
Published 2013“…In the proposed HATSC scheme, the AHP method is uese for criteria weighting, while the TOPSIS method uses for the selection technique based on a multi-criteria decision-making algorithm is proposed. …”
Get full text
Get full text
Thesis -
4
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
5
Automatic algorithm applied for calculating thermal conductivity by transient plane source method
Published 2024“…Additionally, the integration of the time window function max/tθ, typically utilized solely for result validation in conventional methods, further enhances the objectivity and reproducibility of the results obtained by the automatic algorithm…”
Get full text
Get full text
Get full text
Article -
6
Analysis of WiMAX Positioning Using Received- Signal-Strength Method
Published 2013“…This paper presents an analysis of WiMAX positioning by using received-signal-strength (RSS) method. …”
Get full text
Get full text
Get full text
Article -
7
Modern fuzzy min max neural networks for pattern classification
Published 2019“…To build an efficient classifier model, researchers have introduced hybrid models that combine both fuzzy logic and artificial neural networks. Among these algorithms, Fuzzy Min Max (FMM) neural network algorithm has been proven to be one of the premier neural networks for undertaking the pattern classification problems. …”
Get full text
Get full text
Thesis -
8
Improving neural networks training using experiment design approach
Published 2005“…Consider a function approximation problem (Neural Network using Radial Basic Function structure) and limit the amount of training data, say (m) from N amount of possible data. Randomly select the m data set for conventional training algorithm. …”
Get full text
Get full text
Thesis -
9
Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture
Published 2010“…It is shown that the computational complexity of proposed FAST-QR detection algorithm is approximately 48 % lower than the conventional QR decomposition detection algorithm. …”
Get full text
Get full text
Thesis -
10
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We used a Drebin data sample, which is a collection of 5,560 applications, as well as clean data sample containing 1,846 applications. …”
Get full text
Get full text
Get full text
Thesis -
11
FRGS-13-081-0322/ design and modelling of novel dynamic bandwidth aggregation scheme in heterogeneous wireless network (hwn) for mission critical applications
Published 2018“…A multi criteria selection based method, Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) has been applied to select the most suitable RAT in HWN. …”
Get full text
Get full text
Monograph -
12
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…This research was undertaken to develop methods to mitigate shoulder-surfing attack. Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
14
A New Algorithm For Prediction WIMAX Traffic Based On Artificial Neural Network Models
Published 2024“…These data are available from LibyaMax network (WiMAX technology) motorized by Libya Telecom and Technology over a period of 90 days. …”
Get full text
Article -
15
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
16
WiMAX Traffic Forecasting Based On Artificial Intelligence Techniques
Published 2024thesis::doctoral thesis -
17
Smart student timetable planner
Published 2025“…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
-
19
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
20
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article
