Search Results - (( developing emerging implementation algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- implementation algorithm »
- emerging implementation »
- developing emerging »
- validation using »
- java validation »
- using algorithm »
-
1
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
2
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
3
Implementation of Grid Computing for Cryptosystem (RSA)
Published 2005“…Lastly the project has the objective to deploy and a grid computing facility that will beuse as a test bed for RSA algorithm Methodology used for the development is Rapid Application Development (RAD) as it will allow for fast development with a series of testing and prototyping. …”
Get full text
Get full text
Final Year Project -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
5
MBIST implementation and evaluation in FPGA based on low-complexity March algorithms
Published 2024“…They were implemented in the Intel Max 10 DE10-Lite FPGA Development Board. …”
Get full text
Get full text
Get full text
Article -
6
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…Besides, this algorithm provides home users or application developers to implement their own event operators with bespoke syntax for their application purpose by defining cross-events corresponding to the event operators. …”
Get full text
Get full text
Thesis -
8
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
9
-
10
Performance Comparison of Packet Queuing Algorithm in Wireless Networks
Published 2014Get full text
Get full text
Conference or Workshop Item -
11
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
12
Implementing Aproiri Algorithm for Predicting Result Analysis
Published 2013Get full text
Get full text
Article -
13
Development and implementation of GPS for location tracking / Ahmad Ashraff Ariffin
Published 2011“…This GPS will give the coordinates of latitude and longitude as well as the bearing angles between two positions. The algorithm of calculating the distance between these two positions also was developed by using PIC C Compiler. …”
Get full text
Get full text
Thesis -
14
Prediction of COVID-19 outbreak using Support Vector Machine / Muhammad Qayyum Mohd Azman
Published 2024“…In response to the unprecedented challenges posed by the COVID-19 pandemic, this research project presents a systematic approach to outbreak prediction, specifically advocating for the implementation of Support Vector Machine (SVM) algorithms. …”
Get full text
Get full text
Thesis -
15
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
16
Implementing Aproiri Algorithm for Predicting Result Analysis
Published 2013Get full text
Get full text
Article -
17
-
18
Kernel and multi-class classifiers for multi-floor wlan localisation
Published 2016“…For floor localisation, the strategy is based on developing the algorithm to determine the floor by utilising fingerprint clustering technique. …”
Get full text
Get full text
Thesis -
19
Inter-cell and intra-cell facility layout models under different demand environments in cellular manufacturing systems
Published 2012“…Moreover, the computation time (CPU Time) of the developed SA algorithm is significantly less than the benchmarked algorithm. …”
Get full text
Get full text
Thesis -
20
Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji
Published 2018“…Thus the main objective of this study is to implement an automatic algorithm to previous algorithm to make it fully automatic system. …”
Get full text
Get full text
Thesis
