Search Results - (( developing formative causing algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- developing formative »
- application matching »
- formative causing »
- causing algorithm »
- java application »
-
1
-
2
-
3
-
4
-
5
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
6
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Inter-cell and intra-cell facility layout models under different demand environments in cellular manufacturing systems
Published 2012“…Moreover, the computation time (CPU Time) of the developed SA algorithm is significantly less than the benchmarked algorithm. …”
Get full text
Get full text
Thesis -
8
Performance properties optimization of triaxial ceramic-palm oil fuel ash by employing Taguchi design and flower pollination algorithm
Published 2018“…The combustion of wasted palm oil materials leads to the formation of Palm Oil Fuel Ash (POFA). The lack of use of POFA for beneficial applications causes environmental problems. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Modem Recognition Algorithm for Software Defined Radio Base Station
Published 2004“…The proposed algorithm was developed based on 8th order statistical moment and the technique was chosen based on the research work done by Keith et al [15]. …”
Get full text
Get full text
Thesis -
10
Effect of viscous dampers on yielding mechanisms of RC structures during earthquake
Published 2015“…For this purpose, adapting the Newmark method, a finite element algorithm was developed for the nonlinear dynamic analysis of reinforced concrete buildings equipped with VDs that are subjected to earthquake. …”
Get full text
Get full text
Get full text
Article -
11
A new image scrambling technique using block rotation algorithm based on Rubik’s cube
Published 2013“…Also, Most image scrambling algorithms apply one iteration level scrambling that cause a high possibility of occurs the weakness of visual leakage on the image scrambling algorithm which can be reflected by the corresponding scrambled image. …”
Get full text
Get full text
Get full text
Article -
12
Text normalization algorithm for facebook chats in Hausa language
Published 2014“…This is accomplished through modification of the technique employed by [1] to fit Hausa NSWs' formation. It was found that our proposed algorithm was able to normalized Hausa NSWs with an accuracy of 100%. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
Segmenting nodules of lung tomography image with level set algorithm and neural network
Published 2019“…The aim of this research is to develop an image segmentation algorithm for nodule detection in computed tomography (CT) image. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
14
-
15
Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory
Published 2024“…This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
thesis::doctoral thesis -
16
Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking
Published 2012“…Over the last decade, many algorithms have been developed to address this problem. …”
Get full text
Get full text
Thesis -
17
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis -
18
Assessment of proposed lateral resistance system used with framed structures
Published 2016“…The specific finite element algorithms are developed and implemented in the finite element program code for the nonlinear analysis of RC framed buildings. …”
Get full text
Get full text
Thesis -
19
A Threshold-Based Combination of String and Semantic Similarity Measures for Record Linkage
Published 2011“…In other words, in different databases, one entity may be available in different formats. Therefore, when these databases are combined, the availability of entities in different formats causes duplication. …”
Get full text
Thesis -
20
Extreme air pollutant data analysis using classical and Bayesian approaches
Published 2015“…MTM algorithm is an extension of MH algorithm, designed to improve the convergence of MH algorithm by performing parallel computation. …”
Get full text
Get full text
Thesis
