Search Results - (( developing activation function algorithm ) OR ( java communication can algorithm ))
Search alternatives:
- developing activation »
- function algorithm »
- java communication »
- communication can »
- can algorithm »
-
1
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
3
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…SANAsms is capable to send confidential encrypted information in SMS via normal GSM and it only can be read by person who can decrypt it. Currently, normal SMS using GSM communication is not secured and safe enough. …”
Get full text
Get full text
Conference or Workshop Item -
4
Text messaging encryption system
Published 2012“…At present, banking,commerce and passwords can only be communicated with internet connection or as in person verbally or in written;Text Messaging Encryption system needs to overcome this intermediate subjects and deliver instructions or messages instantaneously and securely. …”
Get full text
Get full text
Undergraduates Project Papers -
5
Effort Estimation Model for Function Point Measurement
Published 2007“…This research work has generated an algorithmic effort estimation model for function points measurement. …”
Get full text
Get full text
Thesis -
6
Biometric identification with limited data set
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
EasyA: Easy and effective way to generate pairwise test data
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement
Published 2016“…Utilization of soft-computing algorithms in the operation of Shunt Active Power Filters (SAPFs) becomes a latest trend. …”
Get full text
Get full text
Thesis -
9
Developing A Control Protocol Algorithm For Stimulating The Street Light System
Published 2017“…Thus, smart protocol algorithm is developed to replace the previous system. …”
Get full text
Get full text
Monograph -
10
Real time nonlinear filtered-x lms algorithm for active noise control
Published 2012“…The NLFXLMS algorithm is a stochastic gradient algorithm that incorporates the derivative of a nonlinear plant model which is represented by the scaled error function (SEF) in the controller design. …”
Get full text
Get full text
Thesis -
11
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…Political analysts often communicate with the public and exchange information through the social media platform. …”
Get full text
Get full text
Get full text
Thesis -
12
Secure E-Voting With Blind Signature
Published 2003“…The provider, which is an open source library, is used to provide the secure communication channel. The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
13
Network monopoly / Tan Kean Yeap
Published 2002“…With the powerful networking features of Java, it is expected that this project would produce a "real" game engine. …”
Get full text
Get full text
Thesis -
14
Gps solution for active queue management using android platform
Published 2021“…Since queueing in different locations is considered as a optimisation problem, several algorithms are reviewed to tackle the problem, such as brute force method, nearest neighbour algorithm, and branch and bound algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
-
16
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…Another proposed algorithm is replica placement algorithm which selects and places only one replica in each cluster. …”
Get full text
Get full text
Thesis -
17
Jogging activity recognition using k-NN algorithm
Published 2022“…The objective of this project are 1) to investigate human activity recognition (HAR) for jogging activity and k-Nearest Neighbors (k-NN) algorithm for jogging classifier, 2) to apply HAR AND k-NN for jogging recognition and classification and, 3) to test the functionality of the k-NN algorithm of jogging recognition and classification. …”
Get full text
Get full text
Get full text
Academic Exercise -
18
Performance comparison of THF-NLFXLMS and VFXLMS algorithms for Hammerstein NANC
Published 2016“…Recently, THF-NLFXLMS algorithm was developed to compensate the nonlinearity encountered in nonlinear active noise control systems. …”
Get full text
Get full text
Conference or Workshop Item -
19
Secure scheme for user authentication and authorization in android environment
Published 2013“…Experimented on java platform, the implementation techniques discussed in the paper are found to be very robust…”
Get full text
Get full text
Get full text
Article -
20
Uninterruptible power supply topology using single phase matrix converter with active power filter functionality / Muhammad Shawwal Mohamad Rawi
Published 2022“…The distorted supply current waveform due to the non-linear load is compensated through a proper switching algorithm of SPMC to function as an Active Power Filter (APF). …”
Get full text
Get full text
Thesis
