Search Results - (( its applications out algorithm ) OR ( web application force algorithm ))*
Search alternatives:
- application force »
- its applications »
- applications out »
- web application »
- force algorithm »
- out algorithm »
-
1
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…Previous studies have not yet designed such a system that is reliable enough for such critical applications. This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
Get full text
Get full text
Thesis -
2
Variable order variable stepsize algorithm for solving nonlinear Duffing oscillator
Published 2024journal::journal article -
3
A new split based searching for exact pattern matching for natural texts
Published 2018“…Exact pattern matching algorithms are popular and used widely in several applications, such as molecular biology, text processing, image processing, web search engines, network intrusion detection systems and operating systems. …”
Get full text
Get full text
Article -
4
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
5
A novel approach to enhance the accuracy of vibration control of Frames
Published 2018Get full text
Get full text
Article -
6
Parallel matrix-multiplication algorithm on network of workstations
Published 2004“…However, these types of algorithms often carried out on expensive supercomputers or multiprocessing systems. …”
Get full text
Get full text
Get full text
Article -
7
Optimal power flow using the Jaya algorithm
Published 2016“…Statistical analysis is also carried out to check the reliability of the Jaya algorithm. …”
Get full text
Get full text
Get full text
Article -
8
Voting algorithms for large scale fault-tolerant systems
Published 2011“…To do so, we have introduced a new sequential m-out-of-n algorithm with prediction ability which is known as enhanced m-out-of-n voter. …”
Get full text
Get full text
Thesis -
9
-
10
Stroke-to-stroke matching in on-line signature verification
Published 2010Get full text
Get full text
Thesis -
11
-
12
Enhanced Continuous Face Recognition Algorithm for Bandwidth Constrained Network in Real Time Application
Published 2023Conference Paper -
13
Hybrid genetic manta ray foraging optimization and its application to interval type 2 fuzzy logic control of an inverted pendulum system
Published 2020“…However, this optimization algorithm can be improved in its strategy which increases its accuracy. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Review of the grey wolf optimization algorithm: variants and applications
Published 2023“…The GWO algorithm offers several significant benefits, including simple implementation, rapid convergence, and superior convergence outcomes, leading to its effective application in diverse fields for solving optimization issues. …”
Get full text
Get full text
Article -
15
An Improved of Channel Allocation for WLAN Using Vertex Merge Algorithm
Published 2012Get full text
Get full text
Conference or Workshop Item -
16
DC motor control using LQR algorithm
Published 2008“…An application in Matlab called Simulink is used as tools for algorithm implementation. …”
Get full text
Get full text
Undergraduates Project Papers -
17
Fsm-Based Enhanced March C- Algorithm For Memory Built-In Self-Test
Published 2017Get full text
Get full text
Thesis -
18
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The approach of the mobile cloud is clearly occurring with web host servers expands thus large number of data around the world stored in huge servers, consumers of mobile devices and small computing devices have high performance expectations usually, therefore mobile cloud computing theorizes that the cloud will soon become a disruptive force in the mobile world, eventually becoming the dominant way in which mobile applications operates. …”
Get full text
Get full text
Thesis -
19
-
20
