Search Results - (( identification implementation based algorithm ) OR ( java implementation _ algorithm ))
Search alternatives:
- identification implementation »
- implementation based »
- java implementation »
-
1
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The result shows that the performance of FRA correlates strongly to PQF model with 98% correlation compared to the Kolmogorov-Smirnov Correlation Based Filter (KSCBF) algorithm with 83% correlation. …”
Get full text
Get full text
Get full text
Thesis -
2
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…KSFaci is embedded in web environment and is implemented using Java Servlet and runs under Apache server. …”
Get full text
Get full text
Thesis -
3
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification
Published 2017“…Therefore, local feature extraction techniques were used to overcome these issues. A pooling based feature extraction technique for finger vein identification was implemented in this research. …”
Get full text
Get full text
Thesis -
5
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
6
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
7
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
8
Smoothed functional algorithm with norm-limited update vector for identification of continuous-time fractional-order Hammerstein Models
Published 2024“…In particular, the standard smoothed functional algorithm (SFA) based method is modified by implementing a limit function in the update vector of the standard SFA based method to solve the issue of high tendency of divergence during the identification process. …”
Get full text
Get full text
Get full text
Article -
9
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
10
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
11
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis -
12
Feature identification in a real surface metrology analysis by means of Double Iteration Sobel (DIS) / Ainaa Farhanah Mohd Razali
Published 2022“…In this case, the algorithm of the DIS operator is embedded with the Marker-based Watershed segmentation as the assistance of Marker-based Watershed Segmentation is effective in extracting the individual significant edges features produced by DIS operator. …”
Get full text
Get full text
Thesis -
13
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
14
-
15
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
16
Fpga-Based Accelerator For The Identification Of Finger Vein Pattern Via K-Nearest Centroid Neighbors
Published 2016“…In conclusion, the finger vein identification hardware architecture based on KNCN classifier is successfully implemented on an FPGA board with faster processing time as compared with software-based implementation of KNCN classifier in MATLAB.…”
Get full text
Get full text
Thesis -
17
An implementation of open systems interconnection (OSI) transport layer P2P identification algorithm using Netflow and Netfilter as a P2P traffic firewall / Amir Herman Amiruddin
Published 2014“…The experiment showed that, for P2P identification ability, Netflow based algorithm detected 28.7% more than DPI. …”
Get full text
Get full text
Thesis -
18
Language identification system using Matlab: design, implementation, and sample codes
Published 2017“…This book investigates the development of language identification based on Mel-Frequency Cepstral Coefficients (MFCC) and Vector Quantization (VQ) algorithm. …”
Get full text
Get full text
Book -
19
-
20
Grouping based radio frequency identification anti-collision protocols for dense internet of things application
Published 2022“…The results also demonstrate FCMBG bettered other grouping-based algorithms (GB-DFSA and GBSA) whose tag estimation method are based on collision slots in terms slot efficiency by over 10% and also in terms of identification time.…”
Get full text
Get full text
Article
