Search Results - (( developing construct normalization algorithm ) OR ( java based verification algorithm ))
Search alternatives:
- construct normalization »
- normalization algorithm »
- verification algorithm »
- developing construct »
- based verification »
- java »
-
1
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. …”
Get full text
Get full text
Thesis -
3
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…An algorithm for selecting communication system is developed by comparing Received Signal Strength Indicator (RSSI) of Wi-Fi and GSM with the priority given to Wi-Fi, followed by GSM and RF. …”
Get full text
Get full text
Thesis -
4
The Anglerfish algorithm: a derivation of randomized incremental construction technique for solving the traveling salesman problem
Published 2019“…The combination of possible solutions are rather vast and often overwhelms the limited computational power. Smart algorithms have been developed to address this issue. …”
Get full text
Get full text
Article -
5
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…For this research, several set of robots by using Lego has been developed and it uses LeJos and C programming techniques as a platform. A Java-based robot development tool has been set up as alternative programming methods incorporating LeJos and the controller. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis -
7
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
AUTONOMOUS POWER LINE INSPECTION USING COMPUTER VISION
Published 2022“…The developed algorithm is trained on the augmented Chinese Power Line Insulator Dataset (CPLID) that consisted of normal and missing cap insulator images. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
9
-
10
802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar
Published 2007“…This paper present a wireless sniffer monitoring tool, as well as the analysis and development process of constructing it. The goal is to design a wireless sniffer that can automatically detect spoofing and provide simple network statistic. …”
Get full text
Get full text
Thesis -
11
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
12
Development of a scalable video compression algorithm
Published 2012“…The result shows that the managed complexity algorithm based on Lagrangian Multiplier function outperforms the normal encoder. …”
Get full text
Get full text
Get full text
Proceeding Paper -
13
Lumped parameter modelling in femoral popliteal artery for normal and severe conditions
Published 2018“…Thus, this study aims to develop numerical modelling in femoropopliteal artery by constructing an electric analog model to the system. …”
Get full text
Get full text
Article -
14
-
15
Fuzzy state space modeling for solving inverse problems in multivariable dynamic systems
Published 2005“…To facilitate the implementation of these algorithms, a semi-automated computational tool using Matlab® programming facilities is developed. …”
Get full text
Get full text
Thesis -
16
A DNA-Inspired Symmetric Lightweight Block Cipher With Strong Randomness Properties
Published 2026“…This thesis outlines the complete algorithm design and construction of the DNA-Inspired Symmetric Lightweight Block Cipher, specifically emphasizing on the development of the DNA-Inspired Substitution Table (DNA S-Box) and the DNA-Inspired Permutation Table (DNA P-Box). …”
thesis::doctoral thesis -
17
Development of Finite Element Code for Non-Linear Analysis of Interlocking Mortarless Masonry System
Published 2006“…Presently, interlocking mortarless masonry system has been developed as an alternative to the conventional mortared masonry system for wall construction. …”
Get full text
Get full text
Thesis -
18
-
19
-
20
