Search Results - (( basic selection method algorithm ) OR ( java implementation mechanism algorithm ))
Search alternatives:
- implementation mechanism »
- java implementation »
- mechanism algorithm »
- selection method »
- method algorithm »
- basic selection »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The correctness of the proposed protocol is demonstrated in a simulation model developed in JAVA TCP/IP socket. Next, the proposed protocol is implemented in RFID system including IAIK UHF Demo tag, TagSense Nano-UHF reader and back-end database. …”
Get full text
Get full text
Thesis -
4
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
5
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
Review -
6
Improving Class Timetabling using Genetic Algorithm
Published 2006“…Hence, the major aim of this research is to investigate the internal mechanism of genetic algorithm in solving and improving class timetabling problem. …”
Get full text
Get full text
Get full text
Thesis -
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
8
-
9
-
10
An ensemble feature selection method to detect web spam
Published 2018“…In addition, it improves classification metrics in comparison to basic feature selection methods.…”
Get full text
Get full text
Get full text
Article -
11
System identification using Extended Kalman Filter
Published 2017“…Besides, Extended Kalman Filter (EKF) algorithm was selected in this project as an algorithm for offline estimation data purposes. …”
Get full text
Get full text
Student Project -
12
Enhanced Distributed Learning Classifier System For Simulated Mobile Robot Behaviours
Published 2010“…This thesis proposes methods that can overcome the problems of good behaviour selection and good behaviour deletion. …”
Get full text
Get full text
Thesis -
13
Development Of Double Stage Filter (DSF) On Stereo Matching Algorithm For 3D Computer Vision Applications
Published 2016“…Based on the results of evaluations, the results obtained by DSF is better than the algorithms, basic block matching and dynamic programming.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Improved Multi-Verse Optimizer In Text Document Clustering For Topic Extraction
Published 2021“…To achieve this aim: First, A new feature selection method for TDC, that is, binary multi-verse optimizer algorithm (BMVO) is proposed to eliminate irrelevantly, redundant features and obtain a new subset of more informative features. …”
Get full text
Get full text
Thesis -
15
-
16
Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus
Published 2003“…A systematic method for selecting the ANN's input variables was developed using Matlab Programming language.…”
Get full text
Get full text
Thesis -
17
Flowshop scheduling using artificial bee colony (ABC) algorithm with varying onlooker bees approaches
Published 2015“…Artificial Bee Colony (ABC) algorithm is one of the methods used to solve the flowshop scheduling problem but only a few researches have been found using this method in this area. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Robust correlation feature selection based support vector machine approach for high dimensional datasets
Published 2025“…Correlation-based feature selection methods are popular tools used to select the most important variables to include the true model in the analysis of sparse and high-dimensional models. …”
Get full text
Get full text
Get full text
Article -
19
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006Get full text
Get full text
Get full text
Conference or Workshop Item -
20
