Search Results - (( from implementation force algorithm ) OR ( java application model algorithm ))
Search alternatives:
- implementation force »
- from implementation »
- application model »
- java application »
- force algorithm »
- model algorithm »
-
1
-
2
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
3
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
4
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
6
Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network
Published 2014“…This study proposed Extended Virtual Force and Cuckoo Search (EVFCS) algorithm with a combination of EVFA and CS algorithm to find an optimal node placement. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
Magnetic Optimization Algorithm Approach For Travelling Salesman Problem
Published 2012“…In this implementation, each magnetic agent or particle in Magnetic Optimization Algorithm represents a candidate solution of the Travelling Salesman Problem. …”
Get full text
Get full text
Conference or Workshop Item -
9
Software User Interface and Algorithm Development for Signal and Noise Characterization
Published 2015“…The previous task done by senior is I/V converter and algorithm for detect location of photodiode are implement by using LM741 op-amp chip on printed circuit board. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
-
11
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
Get full text
Get full text
Final Year Project -
12
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item -
13
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
Get full text
Get full text
Get full text
Thesis -
14
Real time self-calibration algorithm of pressure sensor for robotic hand glove system
Published 2019“…The proposed method was validated by comparing the output force of PSCA with the experimental target force from load cell (reference). …”
Get full text
Get full text
Thesis -
15
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Subjects:Conference paper -
16
Network game (Literati) / Chung Mei Kuen
Published 2003“…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
17
Automated time series forecasting
Published 2011Get full text
Get full text
Get full text
Monograph -
18
-
19
Features selection for IDS in encrypted traffic using genetic algorithm
Published 2013“…Feature selection for IDS is a fundamental step in detection procedure and aims to eliminate some irrelevant and unneeded features from the dataset. This paper presents a hybrid feature selection using Genetic Algorithm and Bayesian Network to improve Brute Force attack detection in Secure Shell (SSH) traffic.Brute Force attack traffic collected in a client-server model is implemented in proposed method.Our results prove that the most efficient features were selected by proposed method.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Application of inerter in passenger vehicle suspension systems / Soong Ming Foong
Published 2015“…Then, switching algorithms were implemented to the inerter to evaluate potential further ride performance improvement brought by these modifications. …”
Get full text
Get full text
Thesis
