Search Results - (( developing special function algorithm ) OR ( java implementation during algorithm ))
Search alternatives:
- implementation during »
- java implementation »
- developing special »
- function algorithm »
- special function »
- during algorithm »
-
1
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Computation of cryptosystem based on Lucas functions using addition chain
Published 2010“…Cryptosystem based on Lucas Functions is known as LUC Cryptosystem. Lucas Functions are the special form of second-order linear recurrence relation using a large public integer as modulus. …”
Get full text
Get full text
Conference or Workshop Item -
3
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
4
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
5
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A hybrid SP-QPSO algorithm with parameter free adaptive penalty method for constrained global optimization problems
Published 2018“…Most real-life optimization problems involve constraints which require a specialized mechanism to deal with them. The presence of constraints imposes additional challenges to the researchers motivated towards the development of new algorithm with efficient constraint handling mechanism. …”
Get full text
Get full text
Get full text
Article -
7
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
8
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
Get full text
Get full text
Thesis -
9
A new cryptosystem analogous to LUCELG and Cramer-Shoup
Published 2009“…Since the encryption and decryption algorithm of a new cryptosystem is based on the defined Lucas function, it is believed that the security of Lucas function is polynomial-time equivalent to the generalized discrete logarithm problems. …”
Get full text
Get full text
Get full text
Article -
10
Seed disperser ant algorithm for optimization / Chang Wen Liang
Published 2018“…The Seed Disperser Ant Algorithm (SDAA) is developed based on the evolution or expansion process of Seed Disperser Ant (Aphaenogaster senilis) colony. …”
Get full text
Get full text
Get full text
Thesis -
11
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
12
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
13
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To prevent overfitting, early stopping is used to monitor validation loss during training and dropout rate of 0.3 are applied. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Block multistep methods for solving first order retarded and neutral delay differential equations
Published 2015“…The numerical solution of RDDE is then extended for solving the neutral delay differential equations (NDDE) of non-discontinuity and discontinuity cases. A new subroutine function has been added in the developed algorithm with the capabilities to approximate the neutral delay term using the interpolation of function evaluation. …”
Get full text
Get full text
Thesis -
15
RISC-V instruction set extension on blockchain application
Published 2024“…One of the most common cryptographic algorithms used in blockchain would be selected in this paper, typically djb2 hash algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Extraction of Inherent Frequency Components of Multiway EEG Data Using Two-Stage Neural Canonical Correlation Analysis
Published 2014“…This provides a great opportunity in analyzing brain-body function.…”
Get full text
Get full text
Get full text
Article -
17
Alternative method for economic dispatch utilizing grey wolf optimizer
Published 2015“…Although several optimization methodologies have been developed for solving ED problems, the complexity of the task reveals the necessity for development of efficient algorithms to accurately locate the optimum solution. …”
Get full text
Get full text
Thesis -
18
Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Efficient Clustering Method
Published 2010“…The proposed architecture is more scalable and proposed algorithm is robustness against even/uneven node deployment.…”
Get full text
Get full text
Citation Index Journal -
19
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Therefore tests can be conducted as you develop the system. From tests, it was observed that all functions perfectly, accurately, and swiftly, indicating the advantages of an E-Certificate system.…”
Get full text
Get full text
Thesis -
20
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…WebDID is an alternative method to protect web server by detecting unauthorised changes in web and sending an intrusion alarm directly to web server administrator. Hashing function implementation have been using in this system as its cryptography algorithm. …”
Get full text
Get full text
Monograph
