Search Results - (( developing permutation based algorithm ) OR ( java application based algorithm ))
Search alternatives:
- developing permutation »
- permutation based »
- application based »
- java application »
-
1
SEALiP: A simple and efficient algorithm for listing permutation via starter set method
Published 2013“…In order to demonstrate the algorithm, we are keen to list the permutations with the special references for cases of three and four objects.Based on this algorithm, a new method for listing permutations is developed and analyzed.This new permutation method will be compared with the existing lexicographic method.The results revealed that this new method is more efficient in terms of computation time.…”
Get full text
Get full text
Get full text
Article -
2
New algorithm for listing all permutations
Published 2010“…The most challenging task dealing with permutation is when the element is large. In this paper, a new algorithm for listing down all permutations for n elements is developed based on distinct starter sets. …”
Get full text
Get full text
Get full text
Article -
3
Starter Set Generation Based on Factorial Numbers for Half Wing of Butterfly Representation
Published 2021“…Case is demonstrated for a new algorithm for lexicographic order permutation. In conclusion, this new development is only applicable for generating starter sets as a lexicographic order permutation due to factorial numbers is applicable for lexicographic order permutation…”
Get full text
Get full text
Get full text
Article -
4
Parallel strategy for starter sets to list all permutation based on cycling restriction
Published 2011“…permutations.The sequential algorithm is developed and parallelized for parallel computing by integrating with Message Passing Interface (MPI) libraries. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Improved Watermarking Algorithm Based on Discrete Wavelet Transform and Fibonacci Permutation
Published 2005“…This algorithm is based on the combination of Fibonacci permutation and discrete wavelet transforms (DWT). …”
Get full text
Get full text
Thesis -
6
The division free parallel algorithm for finding determinant
Published 2013“…A cross multiplication method for determinant was generalized for any size of square matrices using a new permutation strategy.The permutation is generated based on starter sets.However, via permutation, the time execution of sequential algorithm became longer.Thus, in order to reduce the computation time, a parallel strategy was developed which is suited for master and slave paradigm of the high performance computer.A parallel algorithm is integrated with message passing interface.The numerical results showed that the parallel methods computed the determinants faster than the sequential counterparts particularly when the tasks were equally allocated.…”
Get full text
Get full text
Get full text
Article -
7
-
8
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…This research proposed a new Key Schedule Algorithm based on the coordinate geometry of a Hybrid Cube (KSAHC) for the non-binary block cipher. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
A block cipher based on genetic algorithm
Published 2016“…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
Get full text
Get full text
Get full text
Thesis -
10
Numerical assessment on makespan minimization by adopting NEH heuristics in permutation flow shop
Published 2015“…Few algorithms have been developed for deciding the sequence of n jobs and m machines to minimize makespan in the flow shop. …”
Get full text
Get full text
Conference or Workshop Item -
11
Systematic literature review: Trend analysis on the design of lightweight block cipher
Published 2024journal::journal article -
12
Methodology to develop bottleneck-based heuristic for permutation flow shop scheduling
Published 2020Get full text
Get full text
Book Section -
13
-
14
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
15
Bottleneck-based heuristic for permutation flowshop scheduling
Published 2017“…The newly heuristic is developed by introducing the bottleneck-based concept that was applied at the beginning of initial solution determination. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
A wavelet based watermarking algorithm for video
Published 2005“…In this paper, a video watermarking algorithm based on wavelets is proposed. In this algorithm, to achieve better imperceptibility and robustness a binary image watermark is inserted into the middle frequency subband coefficients of the blue component of the video frame. …”
Get full text
Get full text
Conference or Workshop Item -
17
A new starter sets generation method by fixing any element under exchange restriction
Published 2016“…Permutation array are of recent interest because of their application to data transmission over power lines.A new permutation technique based on distinct starter sets by employing circular and reversing operations.The crucial task is to generate the distinct starter sets by eliminating the equivalence starter sets.Meanwhile a new strategy for starter sets generation without generating its equivalence starter sets were developed and more efficient in terms of computation time compared to old method. …”
Get full text
Get full text
Article -
18
Makespan algorithms and heuristic for internet-based collaborative manufacturing process using bottleneck approach
Published 2010“…It was shown that using bottleneck-based analysis, effective makespan algorithms and constructive heuristic can be developed to solve for near-optimal scheduling sequence. …”
Get full text
Get full text
Get full text
Article -
19
Development of DNA-based dynamic key-dependent block cipher
Published 2015“…Hence, it is necessary to research and develop a secure symmetric cipher algorithm. Since the declaration of Rijndael as AES this cipher has been the target of many attacks, and the attempts to break it are ongoing and even increasing everyday by taking advantage of the rapid development in computing capabilities. …”
Get full text
Get full text
Thesis -
20
A fast and efficient crosstalk-free algorithm for routing in optical multistage interconnection networks
Published 2008“…To evaluate the performance of the new algorithm, a crosstalk-free version of the original ZeroXY algorithm is developed extended from the Improved ZeroXY algorithm, called the Modified ZeroXY algorithm. …”
Get full text
Get full text
Conference or Workshop Item
