Search Results - (( developing a constructions algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- constructions algorithm »
- validation using »
- a constructions »
- java validation »
- using algorithm »
-
1
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
Get full text
Get full text
Get full text
Thesis -
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
3
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
6
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
7
-
8
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
9
An Efficient Computational Algorithm for Solving Arbitrary Sylvester Matrix Equations in Fuzzy Control Theory (S/O 14179)
Published 2021“…With that, the constructed algorithm is considered as a new contribution to the application of control system theory…”
Get full text
Get full text
Monograph -
10
Generalized Triad Design Algorithms
Published 2012“…In addition, new constructions for the starter of a compatible factorization on v objects, a SCF(v), and new algorithms for a CF(v) was developed. …”
Get full text
Get full text
Thesis -
11
Developing A General Algorithm For Ball CurveWith GC2.
Published 2005“…This paper dwells in developing a general algorithm for constructing a piecewise Ball Curve with curvature continuity (GC2). …”
Get full text
Get full text
Conference or Workshop Item -
12
Strategies for effective value management practice in construction industry
Published 2017“…The objectives were to develop a new optimisation algorithm and apply the results to control construction project costs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Customised fitness function of evolutionary algorithm for optimization of car park space / Ahmad Syahir Ab. Aziz
Published 2017“…The problem nowadays is parking spaces claimed to have a very high value. Moreover, the developer must ensure that the parking space is construct with maximum capacity and avoid from waste area. …”
Get full text
Get full text
Thesis -
14
Chebyshev approximation of discrete polynomials and splines
Published 2004“…The output of the algorithm is a set of extreme points that can be used to construct a minimal error approximation function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Chebyshev approximation of discrete polynomials and splines
Published 2004“…The output of the algorithm is a set of extreme points that can be used to construct a minimal error approximation function. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Visualisation tool to study malaria transmission using network modelling
Published 2014“…Java was used to implement the visualisation tool. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
17
Developing an algorithm for triad design
Published 2012Get full text
Get full text
Get full text
Article -
18
Numerical construction of deformation field in a converging channel
Published 2021“…This algorithm developed to construct the stress,…”
Get full text
Get full text
Conference or Workshop Item -
19
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Published 2019“…MSCIF integrates three main algorithms: clustering algorithm, selection algorithm, and a synchronized flooding. …”
Get full text
Get full text
Thesis -
20
Ball surface representations using partial differential equations
Published 2015“…Hence, this new algorithm is a viable alternative for constructing generalized Ball surfaces. …”
Get full text
Get full text
Get full text
Thesis
