Search Results - (( developing code classification algorithm ) OR ( java implementation mechanism algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection by Ahmed Khan, Fazeel, Abubakar, Adamu

    Published 2024
    “…This study develops and analyze using neural network-based models for effective classification of data packets using the DSCP header field. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Content adaptive fast motion estimation based on spatio-temporal homogeneity analysis and motion classification by Nisar, Humaira, Malik, Aamir Saeed, Choi, Tae-Sun

    Published 2012
    “…In video coding, research is focused on the development of fast motion estimation (ME) algorithms while keeping the coding distortion as small as possible. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Scene classification for aerial images based on CNN using sparse coding technique by Qayyum, A., Malik, A.S., Saad, N.M., Iqbal, M., Faris Abdullah, M., Rasheed, W., Rashid Abdullah, T.A., Bin Jafaar, M.Y.

    Published 2017
    “…However, cataloguing presents a fundamental problem for high-resolution remote-sensing imagery (HRRS). Recent developments include several approaches and numerous algorithms address the task. …”
    Get full text
    Get full text
    Article
  7. 7

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The correctness of the proposed protocol is demonstrated in a simulation model developed in JAVA TCP/IP socket. Next, the proposed protocol is implemented in RFID system including IAIK UHF Demo tag, TagSense Nano-UHF reader and back-end database. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Crow Search Freeman Chain Code (CS-FCC) feature extraction algorithm for handwritten character recognition by Muhammad Arif, Mohamad, Zalili, Musa, Amelia Ritahani, Ismail

    Published 2023
    “…With so many algorithms developed to improve classification accuracy, interest in feature extraction in Handwritten Character Recognition (HCR) has increased. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Implementation of RIO in UMJaNetSim / Chan Chin We by Chan, Chin We

    Published 2004
    “…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
    Get full text
    Get full text
    Thesis
  11. 11

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  12. 12

    The development of virtual product life cycle design tool using artificial intelligence technique by Harun, Habibollah, Ismail @ Ishak, Hasrul Haidar, Sukimin, Zuraini

    Published 2008
    “…The generated features from code classification algorithm give the information of machining parameter through the mapping algorithm. …”
    Get full text
    Monograph
  13. 13
  14. 14

    Improving Class Timetabling using Genetic Algorithm by Qutishat, Ahmed Mohammed Ali

    Published 2006
    “…Hence, the major aim of this research is to investigate the internal mechanism of genetic algorithm in solving and improving class timetabling problem. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Development Of Generative Computer-Aided Process Planning For Cnc Milling Parts_Pramodkumar S Kataraki by S Kataraki, Pramodkumar

    Published 2019
    “…The overall delta volume (ODV) is classified into SDVF, SDVT, SDVF filled region, SDV-VF, and SDVR. Algorithm is developed to auto-recognize surfaces of a milling part and auto-generate ODV. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…The features extracted of time domain and frequency domain in vibration and acoustic will use as database of a Support Vector Machine (SVM) algorithms by using MATLAB R2021a. The result from the SVM algorithms will be used as database for the machine learning in Microsoft Azure. …”
    Get full text
    Get full text
    Monograph
  20. 20

    Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning by Safa, Soodabeh

    Published 2016
    “…Beside that, classic bag of visual words algorithm (BoVW) is based on kmeans clustering and every SIFT feature belongs to one cluster and it leads to decreasing classification results. …”
    Get full text
    Get full text
    Thesis