Search Results - (( filing implementation force algorithm ) OR ( java optimisation based algorithm ))
Search alternatives:
- filing implementation »
- implementation force »
- optimisation based »
- java optimisation »
- force algorithm »
-
1
A new algorithm on Graphical User Authentication (GUA) based on multi-line grids
Published 2010“…But committing to memory such strong passwords can prove to be quite a daunting task thus forcing users to resort to writing them down on pieces of papers or even storing them onto a computer file. …”
Get full text
Get full text
Get full text
Article -
2
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
3
Potential field methods and their inherent approaches for path planning
Published 2016“…Two type of forces involved in potential field method; attractive force generated by goals and repulsive force generated by obstacles. …”
Get full text
Get full text
Article -
4
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
The quadriceps muscle of knee joint modelling using neural network approach: Part 2
Published 2017“…— Artificial neural network has been implemented in many filed, and one of the most famous estimators. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…Also, user attributes are stored in the block storage using an InterPlanetary File System (IPFS) protocol to eliminate the concept of centralizing storage. …”
Get full text
Get full text
Thesis
