Search Results - (( developing code ((bees algorithm) OR (based algorithm)) ) OR ( java application use algorithm ))
Search alternatives:
- java application »
- developing code »
- application use »
- bees algorithm »
- use algorithm »
-
1
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…Performance of the proposed algorithm was evaluated on the developed number plates’ image database captured by mobile phone’s camera, i.e. 30 images. …”
Get full text
Get full text
Get full text
Book -
2
Optimal water supply reservoir operation by leveraging the meta-heuristic Harris Hawks algorithms and opposite based learning technique
Published 2024“…The HHO is still a promising method, as proven by its reliability and resilience indices compared to other published heuristic algorithms: at 62.50% and 1.56, respectively. The Artificial Bee Colony (ABC) outcomes satisfied demand at 61.36%, 59.47% with the Particle Swarm Optimisation (PSO), 55.68% with the real-coded Genetic Algorithm (GA), and 23.5 percent with the binary GA. …”
Article -
3
Network game (Literati) / Chung Mei Kuen
Published 2003“…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
4
-
5
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
7
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
8
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
9
Computational intelligence technique for DG installation within contingency scenario / Muhamad Saifullah Mahmud Affandi
Published 2014“…Meanwhile, for ABC algorithm is inspired of the intelligent behavior of bees during the nectar search process. …”
Get full text
Get full text
Get full text
Article -
10
-
11
Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar
Published 2006“…Based on the analysis, the algorithm of neural network classifier corner detector for FCC was found to have more potentials in terms of accuracy of corner detection and suitability of the chain code. …”
Get full text
Get full text
Thesis -
12
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
13
Algorithm analyzer to check the efficiency of codes
Published 2011“…This paper described how software metrics can be used in analyzing efficiency of the developed code in early stage of development. A tool (algorithm analyzer) was developed to enable analyze a given code to check its efficiency level and produce efficiency reports based on the analysis. …”
Get full text
Get full text
Conference or Workshop Item -
14
Development of open platform controller for step-NC compliant CNC system
Published 2020“…Therefore, this study covers the system which has been designed and developed from outdated and conventional PROLIGHT 1000 Milling CNC machine from Light Intelitek as the lesser cost solution which further discussed in detail based upon upgrades of hardware, architecture, and algorithm design. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
-
16
Low Complexity Error Correction in Low Density Parity Check (LDPC) Code Decoder and Encoder for Decode and Forward Cooperative Wireless Communication
Published 2021“…The initial investigation on the existing LDPC code decoding algorithms assists to develop a low complexity LDPC code decoding algorithm. …”
Get full text
Get full text
Get full text
Thesis -
17
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
18
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
19
-
20
Development of high quality speech compression system for Quranic recitation based on modified CELP algorithm
Published 2013“…Next, we optimize CELP algorithm based on previous findings by modifying the original stochastic codebook. …”
Get full text
Get full text
Get full text
Proceeding Paper
