Search Results - (( developing level based algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- developing level »
- validation using »
- java validation »
- using algorithm »
-
1
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
2
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
3
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
5
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
7
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop
Published 2016“…Then, traffic is fitted to best traffic model and percentage level Policing and Shaping algorithm is developed to control the bandwidth used. …”
Get full text
Get full text
Thesis -
8
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
9
An efficient real-time terrain data organization and visualization algorithm based on enhanced triangle-based level of detail technique
Published 2006“…The purpose of this research is to design, develop and implement an algorithm for enhancing the rendering efficiency of triangle-based LOD technique. …”
Get full text
Get full text
Thesis -
10
A simplified synchronous reference frame for indirect current controlled three-level inverter-based shunt active power filters
Published 2016“…This paper presents a new simplified harmonics extraction algorithm based on the synchronous reference frame (SRF) for an indirect current controlled (ICC) three-level neutral point diode clamped (NPC) inverter-based shunt active power filter (SAPF). …”
Get full text
Get full text
Article -
11
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution: article / Nor Azura Ayop
Published 2016“…The objective of this research is to characterize inbound internet traffic collected on real live IP-based campus network. Then, traffic is fitted to best traffic model and percentage level Policing and Shaping algorithm is developed to control the bandwidth used. …”
Get full text
Get full text
Article -
12
Enhanced Instantaneous Power Theory with average algorithm for indirect current controlled three-level inverter-based shunt active power filter under dynamic state conditions
Published 2016“…An enhanced harmonics extraction algorithm based on Instantaneous Power (PQ) Theory is proposed for indirect current controlled (ICC) three-level neutral point diode clamped (NPC) inverter-based shunt active power filter (SAPF). …”
Get full text
Get full text
Get full text
Article -
13
Enhanced control algorithms for multilevel inverter-based shunt active power filter
Published 2017“…Therefore, the main aim of this work is to develop new control algorithms which are capable of improving mitigation and dynamic performances of three-level neutralpoint diode clamped (NPC) inverter-based SAPF. …”
Get full text
Get full text
Get full text
Thesis -
14
Natural image noise level estimation based on local statistics for blind noise reduction
Published 2018“…In this study, a patch-based estimation technique is used to estimate for noise level and applies it to the proposed blind image denoising algorithm. …”
Get full text
Get full text
Get full text
Article -
15
DC-link capacitor voltage regulation with effort-reduction fuzzy logic control for three-level inverter-based shunt active power filter
Published 2017“…This paper presents a fuzzy-based DC-link capacitor voltage regulation algorithm with reduced computational efforts to enhance performance of three-phase three-level neutral-point diode clamped (NPC) inverter-based SAPF in overall DC-link voltage regulation. …”
Get full text
Get full text
Get full text
Article -
16
Water level forecasting using feed forward neural networks optimized by African Buffalo Algorithm (ABO)
Published 2019“…This development goal is to reduce the impact of water variation in river water levels. …”
Get full text
Get full text
Thesis -
17
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
18
Development of a user-adaptable human fall detection based on fall risk levels using depth sensor
Published 2018“…Related studies have employed wearable, non-invasive sensors, video cameras and depth sensor-based approaches to develop such monitoring systems. …”
Get full text
Get full text
Get full text
Article -
19
Development of a user-adaptable human fall detection based on fall risk levels using depth sensor
Published 2018“…Related studies have employed wearable, non-invasive sensors, video cameras and depth sensor-based approaches to develop such monitoring systems. …”
Get full text
Get full text
Get full text
Article -
20
A novel scheduling algorithm based on game theory and multicriteria decision making in LTE network
Published 2015“…On the second level, TOPSIS algorithm allocates the resources among application's users based on their criteria and the application's preferences. …”
Get full text
Get full text
Get full text
Article
