Search Results - (( developing effective utilization algorithm ) OR ( java data function algorithm ))
Search alternatives:
- utilization algorithm »
- function algorithm »
- data function »
- java »
-
1
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Prototypes, simulations, observations and interviews were used as the data gathering methods. An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
3
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Improving utility accrual scheduling algorithm for adaptive real-time system
Published 2008“…Both of these algorithms are developed for adaptive real-time system environment where untoward effects such as deadline misses and overloads are tolerable. …”
Get full text
Get full text
Conference or Workshop Item -
5
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
6
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
7
Experimental evaluation of bottleneck link utilization with new-additive increase multiplicative decrease congestion avoidance and control algorithm.
Published 2009“…And also all the developments for the congestion control and avoidance algorithms interest about the using of network resources and use the links capacity (utilization). …”
Get full text
Get full text
Article -
8
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
9
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
10
On the delay and link utilization with the new-additive increase multiplicative decrease congestion avoidance and control algorithm
Published 2010“…We want to evaluate the effect of using the AIMD algorithm after developing it, which we called the New-AIMD algorithm, to find a new approach to measure the end-to-end delay and bottleneck link utilization and use the NCTUns simulator to obtain the results after making the modification for the mechanism. …”
Get full text
Get full text
Get full text
Article -
11
Multi-objective optimization of stand-alone hybrid renewable energy system by genetic algorithm
Published 2013“…Multi-objective optimization of HRES by Evolutionary Algorithm have become attractive in recent years due to the effectiveness of such algorithms for complicated problems. …”
Get full text
Get full text
Thesis -
12
Energy Management in Integrated Microgrids: An Optimal Schedule Controller Utilizing Gradient Descent Algorithm
Published 2024“…The developed BGD algorithm's effectiveness is further validated through a comparative analysis with conventional methods…”
Conference Paper -
13
Sentiment mining using immune network algorithm /Raja Muhammad Hafiz Raja Kamarudin
Published 2012“…This research tries to utilize biological-inspired computing algorithm, Immune Network algorithm, in this sentiment analysis field. …”
Get full text
Get full text
Thesis -
14
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…Moreover, the system must satisfy non-functional requirements like reliability, efficiency, performance, effective resource utilization, and scalability. Thus, overall aim of this research is to introduce new grid scheduling algorithms for resource allocation as well as for job scheduling for enabling a highly efficient and effective utilization of the resources in executing various applications. …”
Get full text
Get full text
Thesis -
15
Towards the utilization of normalized LMS algorithm in adaptive filter
Published 2014“…In this paper, we focused on how the development of algorithms helped reduce the level of noise. …”
Get full text
Get full text
Get full text
Article -
16
Development of task distribution algorithm for multi-robot coordination system
Published 2022“…The problem always arises when robots are navigating such as the collision between robots and obstacles. Hence, an effective task distribution algorithm is important to allocate tasks correctly among the robots with optimum cost and time utilization. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Smart student timetable planner
Published 2025“…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Optimization Of Dynamic Transportation Task Assignment In A Manufacturing Facility
Published 2020“…A pattern toward multi-objectives approaches, developing facility layout software utilizing meta-heuristics, for example, simulated annealing (SA), genetic algorithm (GA), Anylogic Software and concurrent engineering to facility layout is observed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Enhanced location and positioning in wimax networks with virtual mimo base station
Published 2015“…The developed algorithm includes the effect of the geometric dilution of precision (GDOP) to assist with the location estimation accuracy. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Utility-based non-cooperative power control game in wireless environment / Yousef Ali Mohammed Al-Gumaei
Published 2017“…Numerical simulations are used to prove the effectiveness of these algorithms compared with other existing power control algorithms. …”
Get full text
Get full text
Get full text
Thesis
