Search Results - (( java applications usage algorithm ) OR ( variable information system algorithm ))
Search alternatives:
- variable information »
- applications usage »
- information system »
- java applications »
- system algorithm »
- usage algorithm »
-
1
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016“…The search algorithm is a crucial part in any internet applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
An algorithm for pulsed activation of solenoid valves for variable rate application of agricultural chemicals
Published 2008Get full text
Get full text
Conference or Workshop Item -
3
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
4
EMS decoding algorithm that introduced shuffled strategy and improved variable node update
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…The experimental result shows that using Java 2, this method improves the speed of PrefixSpan up to almost two orders of magnitude as well as the memory usage to more than one order of magnitude.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
-
7
Modification of a commercial PWM sprayer control system for precision farming application
Published 2008Get full text
Get full text
Conference or Workshop Item -
8
Path optimization using genetic algorithm in laser scanning system
Published 2008Get full text
Get full text
Conference or Workshop Item -
9
Path optimization using genetic algorithm in laser scanning system
Published 2023Subjects:Conference paper -
10
Road Sign Detection and Recognition System for Real-Time Embedded Applications
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
11
A study on advanced statistical analysis for network anomaly detection
Published 2005Get full text
Monograph -
12
-
13
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023Short Survey -
14
Comparison on queuing performance measures on customer’s flow using Queuing Theory Model and DSW Algorithm / Muhammad Izuanudin Azmi, Muhamad Aiman Zulhaikal Azizul and Nurul Aisya...
Published 2022“…In this study, the DSW Algorithm is used for the α-cut process to define the required variables for the Fuzzy Queuing Model. …”
Get full text
Get full text
Student Project -
15
-
16
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…This creates challenges in developing secure Elliptic Curve Cryptography systems and performing cryptanalysis for scalar multiplication algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…The dropping decision of the redundant RREQ in the NCPR algorithm completely relies on preset variables, such variables require to be set by the system administrator based on the scenario. …”
Get full text
Get full text
Get full text
Thesis -
18
Recommendation System Model For Decision Making in the E-Commerce Application
Published 2024thesis::doctoral thesis -
19
-
20
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…This creates challenges in developing secure Elliptic Curve Cryptography systems and performing cryptanalysis for scalar multiplication algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
