Search Results - (( development program normalization algorithm ) OR ( java based verification algorithm ))
Search alternatives:
- normalization algorithm »
- verification algorithm »
- program normalization »
- development program »
- based verification »
- java »
-
1
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
2
Parallel computation of maass cusp forms using mathematica
Published 2013“…We find that the parallel programming is about 5.75 times faster than the normal programming while its efficiency is capped at 0.443.…”
Get full text
Get full text
Thesis -
3
Solving non-convex economic dispatch problem using computational intelligence technique
Published 2023Conference Paper -
4
Logic Programming In Radial Basis Function Neural Networks
Published 2013“…Two techniques were developed. The first technique is to encode the logic programming in radial basis function neural networks. …”
Get full text
Get full text
Thesis -
5
Semi-automatic cortical boundary detection / Noor Elaiza Abdul Khalid.
Published 2010Get full text
Get full text
Thesis -
6
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…The prototype is constructed through software and hardware development and has been programmed using Arduino IDE software. …”
Get full text
Get full text
Thesis -
7
-
8
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…For this research, several set of robots by using Lego has been developed and it uses LeJos and C programming techniques as a platform. A Java-based robot development tool has been set up as alternative programming methods incorporating LeJos and the controller. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis -
10
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
-
12
-
13
Data mining in network traffic using fuzzy clustering
Published 2003“…The network traffic model is very important to know whether that particular network traffic is normal or abnormal. In this project, I have developed a program to capture and filter the packets based on the application. …”
Get full text
Get full text
Thesis -
14
Data mining in network traffic using fuzzy clustering
Published 2003“…The network traffic model is very important to know whether that particular network traffic is normal or abnormal. In this project, I have developed a program to capture and filter the packets based on the application. …”
Get full text
Get full text
Thesis -
15
Multi -Objective Economic Dispatch Using Evolutionary Programming
Published 2023“…The designated algorithm of MOEP used MATLAB to run the simulations. …”
-
16
Agent-based extraction algorithm for computational problem solving
Published 2015“…Modeling Computational Problem Solving (CPS) is the main issue in teaching programming where the given text is needed to be transformed into a model then later into a programming language. …”
Get full text
Get full text
Thesis -
17
-
18
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
19
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
20
Enhanced dynamic security assessment for power system under normal and fake tripping contingencies.
Published 2019“…The hybrid logistic model tree (hybrid LMT) approach proposed in this study combines the symmetrical uncertainties (SU) algorithm and the logistic model tree (LMT) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis
