Search Results - (( developing nation computer algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- java implication »
- nation »
-
1
Porting SIMRJGSA Algorithms For Mapping And Alignment To Malay-English Bitexts.
Published 2001Get full text
Get full text
Conference or Workshop Item -
2
-
3
-
4
-
5
Performance enhancement of AIMD algorithm for congestion avoidance and control
Published 2011“…The contribution of this research is to improve the performance of AIMD in terms of efficiency (the network utilization) and fairness. National Chiao Tung University’s network simulation (NCTUns) has been used in this development to compare the new algorithm with the older versions and determine its advantages over the older versions. …”
Get full text
Get full text
Thesis -
6
Analysis and Modification of Grain - 128 Stream Cipher Algorithm
Published 2024thesis::master thesis -
7
A novel computer-aided multivariate water quality index
Published 2015“…A computer-aided multivariate water quality index is developed based on partial least squares (PLS) regression. …”
Get full text
Get full text
Get full text
Article -
8
Optimal source substation location selection in radial distribution networks
Published 2004Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Statistical computing for forensic firearm pattern identification: Evaluating a fisher linear discriminant analysis-based algorithm against fixed-impulse noise
Published 2025“…Furthermore, this study aligns with the United Nations Sustainable Development Goals (SDGs), particularly SDG9 (Industry, Innovation, and Infrastructure), by fostering Artificial Intelligence (AI)-driven forensic advancements and SDG16 (Peace, Justice, and Strong Institution) by strengthening forensic accuracy in criminal investigations, ultimately contributing to national security and judicial efficiency.…”
Get full text
Get full text
Get full text
Article -
10
-
11
Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas
Published 2002“…Raw fingerprint images and filtered images (noise removal and enhancement) are tested to determine the efficiency of the algorithm developed. The improved algorithm has applied to 350 image samples obtained from National Institute of Standards and Technology (NIST). …”
Get full text
Get full text
Thesis -
12
Estimation-based Metaheuristics: A New Branch of Computational Intelligence
Published 2016Get full text
Get full text
Conference or Workshop Item -
13
Designing and Developing an Intelligent Congkak
Published 2011Get full text
Get full text
Get full text
Thesis -
14
Simple expressions for computing impedance matrix of rectangular planar microwave circuits
Published 2003Get full text
Get full text
Conference or Workshop Item -
15
-
16
Secure block cipher inspired by the human immune system
Published 2012“…In computer security service, cryptographic algorithm is used to ensure adequate security of the systems or of data transfers. …”
Get full text
Get full text
Thesis -
17
Physical and computational modeling for finite element analysis
Published 1988Get full text
Get full text
Conference or Workshop Item -
18
A new 128-bit block cipher
Published 2009“…The existence of this new 128-bit block cipher algorithm will increase the protection of the national information infrastructure and also will contribute as an alternative to other cryptographic algorithms in security in the computing industry.…”
Get full text
Get full text
Thesis -
19
The application of firefly algorithm in an adaptive emergency evacuation centre management (AEECM) for dynamic relocation of flood victims
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Programming Approach in Teaching Operations Research Techniques for Computer Science Students
Published 2005Get full text
Get full text
Conference or Workshop Item
