Search Results - (( developing e bit algorithm ) OR ( java visualization based algorithm ))
Search alternatives:
- visualization based »
- java visualization »
- bit algorithm »
- developing e »
- e bit »
-
1
A performance analysis of association rule mining algorithms
Published 2016“…The results of the CPU profiler of Java VisualVM showed that Binary-Based algorithm performs better than Eclat algorithm in-terms of both execution times and memory usage. …”
Get full text
Get full text
Conference or Workshop Item -
2
Analysis of parabolic antennas for radio telescopes and the development of encryption methods for radio astronomical images
Published 2022“…The results showed that this algorithm has better performance compared to other recently developed algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…D3.js is used as a technology to visualize the result in interactive form or dynamic visualization which is a JavaScript library and Python is a language to program the system. …”
Get full text
Get full text
Thesis -
4
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
-
6
New approach of cryptography algorithm for e- mail applications
Published 2005“…The purpose of this paper is to introduce and demonstrate a new algorithm for Internet and e-mail security. The purposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Conference or Workshop Item -
7
Implementation of High Speed Large Integer Multiplication Algorithm on Contemporary Architecture
Published 2018“…To achieve certain level of security, Public Key Cryptography algorithm is performed on large integer that is more than 64-bit, typical bit size supported by conventional Central Processing Unit (CPU) (e.g. 512-bit for Elliptic Curve Cryptography (ECC), 2048-bit for Rivest-Shamir-Adleman (RSA) and million bits for Fully Homomorphic Encryption (FHE)). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. The proposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Thesis -
9
Enhanced bibliographic data retrieval and visualization using query optimization and spectral centrality measure
Published 2019“…This web based approach will be using Java programming language and Mongo DB (NoSQL database) to improve the retrieval performance by 80%, precision of the search result of the bibliographic data by omitting non-significance papers and visualizing a clearer network diagram using centrality measure for better decision making. …”
Get full text
Get full text
Get full text
Article -
10
Testing static single cell faults using static and dynamic data background
Published 2011Get full text
Get full text
Conference or Workshop Item -
11
Proposed method for enhancing quantum bit error rate using quantum key distribution technique
Published 2014Get full text
Get full text
Conference or Workshop Item -
12
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Navigation algorithms are tested in a variety of differently shaped environments to encourage the development of robust solutions, and reduce the possibility of solutions based on memorization of a fixed set of movements. …”
Get full text
Get full text
Monograph -
13
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
14
Comparative analysis of Selective Clonal Mutation with conventional GA operators in solar tracking environment
Published 2023Conference Paper -
15
Least Significant Bit (LSB) and Random Right Circular Shift (RRCF) in digital watermarking
Published 2016“…For simulation of our algorithm, we apply MA TLAB using Least Significant Bit (LSB) and Random Right Circular Shift (RRCF…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
-
17
Graphical user interface for bounded-addition fuzzy splicing systems and their variants / Mathuri Selvarajoo ... [et al.]
Published 2023“…In this research, a graphical user interface is developed to generate all the splicing languages generated by bounded-addition fuzzy splicing systems and their variants. An algorithm is developed using JAVA and Visual Studio Code software in order to replace the time-consuming manual computation of the languages generated by bounded-addition fuzzy DNA splicing systems and their variants.…”
Get full text
Get full text
Article -
18
Enhancement of Single and Composite Images Based on Contourlet Transform Approach
Published 2009“…Image enhancement is an imperative step in almost every image processing algorithms. Numerous image enhancement algorithms have been developed for gray scale images despite their absence in many applications lately. …”
Get full text
Get full text
Thesis -
19
Investigation on pattern based Algorithm for division by a constant number using Verilog code for optimization on the Nelust results
Published 2015“…One of the alternatives is by replacing it with cheaper adder and shifter to compute the same result. The research is to develop an algorithm of unsigned constant division via add-shift method using Verilog code. …”
Get full text
Get full text
Research Report -
20
Security enhancement of digital motion image transmission using hybrid AES-DES algorithm
Published 2023Conference paper
