Search Results - (( developing relative efficiency algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- efficiency algorithm »
- developing relative »
- validation using »
- java validation »
- using algorithm »
-
1
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
2
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
3
Energy efficiency of the bitcoin mining hardware and related blockchain technology
Published 2018“…MATLAB is used in developing and validation the algorithm. Dataset was selected from open sources and applied in the proposed formula to evaluate and predict energy efficiency of bitcoin mining hardware. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
4
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
5
Optimization of assembly line balancing with energy efficiency by using tiki-taka algorithm
Published 2023“…In the modeling phase, all the ALB-EE optimization objectives are presented in a mathematical form to earn line efficiency and energy utilization. Then, the TTA is developed before undergoing functionality tests by benchmarking with Particle Swarm Optimization (PSO), Grey Wolf Optimization (GWO), Genetic Algorithm (GA), and Whale Optimization Algorithm (WOA). …”
Get full text
Get full text
Thesis -
6
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…The steps to calculate a shortest path using A • algorithm is shown by using appropriate examples and related figures. …”
Get full text
Get full text
Thesis -
8
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
9
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
10
Development of symbolic algorithms for certain algebraic processes
Published 2007Get full text
Get full text
Get full text
Monograph -
11
Development of symbolic algorithms for certain algebraic processes
Published 2007Get full text
Get full text
Get full text
Monograph -
12
Path planning for unmanned aerial vehicles using visibility line-based methods
Published 2011“…The proposed 2D path planning algorithms, on the contrary, select a relatively smaller number of vertices using the so-called base line (BL), thus they are computationally efficient. …”
Get full text
Get full text
Thesis -
13
An efficient fault syndromes simulator for SRAM memories
Published 2009“…Due to this, a systematic approach for developing and evaluating memory test algorithm is required. …”
Get full text
Get full text
Get full text
Article -
14
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
15
Optimization of Maximum Power Point Tracking (MPPT) of Photovoltaic System using Artificial Intelligence (AI) Algorithms
Published 2013“…Studies on the conventional and intelligent algorithms are conducted and a comparison between their efficiencies and drawbacks is presented. …”
Get full text
Get full text
Final Year Project -
16
Computation of cryptosystem based on Lucas functions using addition chain
Published 2010“…Lucas Functions are the special form of second-order linear recurrence relation using a large public integer as modulus. In this paper, an efficient computation algorithm for LUC Cryptosystem is developed. …”
Get full text
Get full text
Conference or Workshop Item -
17
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…The joint-scalar is important in applications related to digital signature verification, such as elliptic curve digital signature algorithm and El Gamal signature scheme. …”
Get full text
Get full text
Thesis -
18
Utility-based non-cooperative power control game in wireless environment / Yousef Ali Mohammed Al-Gumaei
Published 2017“…Moreover, these algorithms have a relatively fast convergence rate and guarantee that all users can achieve their required QoS.…”
Get full text
Get full text
Get full text
Thesis -
19
A fault syndromes simulator for random access memories
Published 2008“…Due to this, a systematic approach for developing and evaluating memory test algorithm is required. …”
Get full text
Get full text
Article -
20
Preliminary framework of topology control algorithm in WSN to achieve node's energy efficiency
Published 2016Get full text
Get full text
Conference or Workshop Item
