Search Results - (( basic integration new algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- basic integration »
- implication based »
- java implication »
- integration new »
- new algorithm »
-
1
-
2
Design of nonlinear adaptive interaction algorithm controller for improvement of tracking performance of X-Y table ball screw drive system
Published 2023“…The contribution is Nonlinear Adaptive Interaction Algorithm (NAIA). The controller is developed based on the enhancement and modification of the basic Adaptive Interaction Algorithm Controller (AIA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
-
4
-
5
Utilizing of flower pollination algorithm for brushless DC motor speed controller
Published 2020“…If the PID controller is modified with a new algorithm, better results can be obtained from the BLDC motor. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
-
7
Fuzzy algorithm for 3D coastal gemorphology mapping by DInSAR
Published 2007“…The basic concept of fuzzy algorithm was used to filter DInSAR data. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
A hybrid algorithm based on artificial bee colony and artificial rabbits optimization for solving economic dispatch problem
Published 2023“…The new hybrid algorithm integrates the good features of both standard optimization strategies, thus producing better possible solutions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
Published 2011“…Many public-key cryptosystems are used in our daily lives to attain privacy, authenticity, integrity and non-repudiation. However, most of the existing public-key algorithms are based on complex mathematical computations. …”
Get full text
Get full text
Thesis -
10
A new 128-bit block cipher
Published 2009“…Towards that and after reviewing related research, in this research we propose to come up with a new 128-bit block cipher cryptographic algorithm which shall meet the security requirements. …”
Get full text
Get full text
Thesis -
11
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…It is relevant because it generalizes this process of music creation and provides instruments to musicians and non-musicians for diving into new, unique forms of musical expression. Genetic Algorithms will be chosen because they constantly improve solution, hence appropriate for the development of compositions consistent with the creative and harmonic principles. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…This tool can be used to ease the process of developing a new March test algorithm for NPSF.…”
Get full text
Get full text
Thesis -
13
Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad
Published 2022“…Time consuming and growing of websites complexity is additional reasons of the inadequate website assurance. This paper presents a new framework for websites integrity assurance through a website monitoring application. …”
Get full text
Get full text
Get full text
Article -
14
Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension
Published 2015“…Taking into account from those main issues, this study introduces the new model of integrated algorithm-program visualization (ALPROV) for developing program comprehension tool. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
-
16
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…Web service technology defines several supporting protocols and specifications such as SOAP and WSDL for communication with client and server for data interchange. A new architectural paradigm has emerged in SOA in recent years called REpresentational State Transfer (REST) that is also used to integrate loosely coupled service components, named RESTful web services, by system integration consortiums. …”
Get full text
Get full text
Article -
17
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…Web service technology defines several supporting protocols and specifications such as SOAP and WSDL for communication with client and server for data interchange. A new architectural paradigm has emerged in SOA in recent years called REpresentational State Transfer (REST) that is also used to integrate loosely coupled service components, named RESTful web services, by system integration consortiums. …”
Get full text
Get full text
Article -
18
-
19
A fuzzy case-based reasoning model for software requirements specifications quality assessment
Published 2023“…Additionally, for efficient cases retrieval in the CBR, relevant cases selection and nearest cases selection heuristic search algorithms are used in the system. Basically, the input to the relevant cases algorithm is the available cases in the system case base and the output is the relevant cases. …”
Article -
20
Exploration of educational building with cultural elements using shape grammar
Published 2013“…During the design process, other rules are activated to embed new shapes within the basic building block. The rules are executed to generate designs to provide students a spacious environment for study and related activities. …”
Get full text
Get full text
Undergraduates Project Papers
