Search Results - (( data simulation modified algorithm ) OR ( java implementation _ algorithm ))
Search alternatives:
- simulation modified »
- java implementation »
- data simulation »
-
1
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
2
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
3
Optimized clustering with modified K-means algorithm
Published 2021“…Empirical evidences based on simulated data sets indicated that the proposed modified k-means algorithm is able to recognise the optimum number of clusters for uncorrelated data sets. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis -
5
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
6
Hybrid meta-heuristic algorithm for solving multi-objective aggregate production planning in fuzzy environment
Published 2017“…During the course of the present work, two fuzzy methods (modified Zimmermanns approach and modified angelovs approach ) and fourmeta-heuristics and hybrid meta heuristics including; simulated annealing (SA), modified simulated annealing (MSA), hybrid modified simulated annealing and simplex downhill (MSASD), hybrid modified simulated annealing and modified particle swarm optimization (MSAPSO) were proposed. …”
Get full text
Get full text
Thesis -
7
Improving on the network lifetime of clustered-based wireless sensor network using modified leach algorithm
Published 2012“…This document is a study about LEACH algorithm where the implementation was done using OMNeT++ network simulator to study the performance of this algorithm in term of network lifetime. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
9
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
10
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
11
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
12
1D Multigrid Solver For Finite Element Method
Published 2022“…The new algorithm also has been tested using time simulation. …”
Get full text
Get full text
Monograph -
13
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
14
Stochastic And Modified Sequent Peak Algorithm For Reservoir Planning Analysis Considering Performance Indices
Published 2016“…In the next stage, the modified Sequent Peak Algorithm (SPA) is employed for the Storage-yield planning analysis of reservoir systems at different demands, reliability and vulnerability performance metrics employing the synthetic streamflow data. …”
Get full text
Get full text
Thesis -
15
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
16
Robust diagnostics and variable selection procedure based on modified reweighted fast consistent and high breakdown estimator for high dimensional data
Published 2022“…The performance of the proposed method is illustrated using simulation study and on glass vessel data with 1920 variables, cardiomyopathy microarray data with 6319 variables, and octane data with 226 dimensions. …”
Get full text
Get full text
Thesis -
17
Modified artificial neural network (ANN) models for Malaysian construction costs indices (MCCI) data / Saadi Ahmad Kamaruddin
Published 2018“…Therefore, the main objective of this research is to modify the backpropagation algorithm of nonlinear autoregressive (NAR) and autoregressive moving average (NARMA) models using Tukey-bisquare estimator and a proposed hybrid firefly algorithm on the least median of squares (FFA-LMedS), in order to manage outlying data efficiently, hence produce more accurate forecasted values. …”
Get full text
Get full text
Book Section -
18
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
19
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…The DPA-EHD is further modified by utilizing the pipelining parallelism to reduce the computing iterations and named as data parallel and pipelining algorithm (DPPA-EHD). …”
Get full text
Get full text
Thesis -
20
Modifying maximum likelihood test for solving singularity and outlier problems in high dimensional cases
Published 2021“…The performance of MLѡвсн and four more modified ML-tests, namely MLtests with banded Cholesky estimator MLвсн with Thresholding MLтн with Weiszfeld Algorithm MLѡ and with Weiszfeld’s Algorithm Estimator and Thresholding MLѡтн had been examined using Type I error and power of test values in a simulation study. …”
Get full text
Get full text
Get full text
Get full text
Thesis
