Search Results - (( develop computer modified algorithm ) OR ( java application a algorithm ))
Search alternatives:
- computer modified »
- develop computer »
- java application »
- application a »
- a algorithm »
-
1
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The correctness of the proposed protocol is demonstrated in a simulation model developed in JAVA TCP/IP socket. …”
Get full text
Get full text
Thesis -
2
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…Therefore, replication is a useful technique for distributed systems. It can improve the performance and the reliability of a database application. …”
Get full text
Get full text
Thesis -
3
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
4
Evaluation of structured questions using modified BLEU algorithm
Published 2016Get full text
Get full text
Get full text
Article -
5
Local Stereo Matching Algorithm Using Modified Dynamic Cost Computation
Published 2021“…This approach utilised modified dynamic cost computation in the matching cost. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Estimation of the denitrification in the lower Mississippi Valley
Published 2001Get full text
Get full text
Conference or Workshop Item -
7
Optimized clustering with modified K-means algorithm
Published 2021“…Generally, the proposed modified k-means algorithm is able to determine the optimum number of clusters for huge data.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
-
9
-
10
Analysis and Modification of Grain - 128 Stream Cipher Algorithm
Published 2024thesis::master thesis -
11
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
12
-
13
Bats echolocation-inspired algorithms for global optimisation problems
Published 2016Get full text
Get full text
Thesis -
14
Dynamic obstacle handling in multi-robot coverage
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Modified multi-verse optimizer for solving numerical optimization problems
Published 2020Get full text
Get full text
Conference or Workshop Item -
16
Modified firefly algorithm for directional overcurrent relay coordination in power system protection / Muhamad Hatta Hussain
Published 2020“…The objectives of the studies are to develop a new optimization technique termed as Modified Firefly Algorithm (MFA) for minimizing the relay operating time, to develop a Multi-Objective Modified Firefly Algorithm (MOMFA) for minimizing both the total relay operating time and relay coordination time and to develop an integrated optimal predictor termed as Modified Firefly Algorithm-Artificial Neural Network (MFA-ANN) for accurate prediction of relay operating time. …”
Get full text
Get full text
Thesis -
17
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
18
-
19
Modified word representation vector based scalar weight for contextual text classification
Published 2024“…To validate this algorithm, the modified word vectors are compared with original LLM-generated word vectors to evaluate their reflection of the intended context. …”
Get full text
Get full text
Get full text
Thesis -
20
