Search Results - (( java application customization algorithm ) OR ( using three based algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- three based »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
2
-
3
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…Full search (FS), three step search (TSS), new three step search (NTSS), diamond search (DS) and hexagon based search (HS) are the most well known block-matching algorithm. …”
Get full text
Get full text
Get full text
Book Chapter -
4
Enhancement of {0, 1, 3}-NAF Recoding Algorithm using Block Method Technique for Elliptic Curve Cryptosystem
Published 2015“…The focus of this research is on the enhancement of the scalar arithmetic level by designing and analysing an inexpensive {0, 1, 3}-NAF scalar recoding algorithm in an effort to maintain the Hamming weight for the based algorithm and reduce the algorithm complexity. …”
Get full text
Get full text
Thesis -
5
Indoor positioning using weighted magnetic field signal distance similarity measure and fuzzy based algorithms
Published 2021“…A magnetic-based positioning algorithm should fully utilise the three components of the magnetic field intensity data. …”
Get full text
Get full text
Thesis -
6
Path planning for unmanned aerial vehicles using visibility line-based methods
Published 2011“…This thesis concerns the development of path planning algorithms for unmanned aerial vehicles (UAVs) to avoid obstacles in two- (2D) and three-dimensional (3D) urban environments based on the visibility graph (VG) method. …”
Get full text
Get full text
Thesis -
7
-
8
-
9
-
10
Three phase fault algorithm in distribution system by using database approach and impedance based method
Published 2012“…A three phase fault location algorithm using database and impedance based method is utilized in distribution system to locate fault which may occur in any possible fault sections and to optimize the switching operations to reduce the outage time affected by fault. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Enhanced Harris's Hawk algorithm for continuous multi-objective optimization problems
Published 2020“…This indicates the capability of the algorithm in exploring the search space. The 2S-ENDSHHMO algorithm can be used to improve the search process of other MOSI-based algorithms and can be applied to solve MOPs in applications such as structural design and signal processing.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Breast cancer disease classification using fuzzy-ID3 algorithm with FUZZYDBD method: automatic fuzzy database definition
Published 2021“…The fuzzified dataset was applied in FID3 algorithm, which is the fuzzy version of the ID3 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…This research proposed a new Key Schedule Algorithm based on the coordinate geometry of a Hybrid Cube (KSAHC) for the non-binary block cipher. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
Published 2023“…In order to use this QR-tag as a secret key with IoT-based systems, a three Processes Verification Algorithm (3PVA) has been proposed to verify QR-tag values. …”
Book Chapter -
15
A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali
Published 2012“…The algorithms work by arranging parameters using finite field group in elliptic curve E. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Makespan algorithms and heuristic for internet-based collaborative manufacturing process using bottleneck approach
Published 2010“…This paper presents makespan algorithms and scheduling heuristic for an Internet-based collaborative design and manufacturing process using bottleneck approach. …”
Get full text
Get full text
Get full text
Article -
17
Optimal operation of multi-reservoir systems for increasing power generation using a seagull optimization algorithm and heading policy
Published 2021“…The results indicated that the global solution of the MSOO based on NLP for Two-Point Heading Rule (1) under the first inflow scenario and was 3.22 while the average solution of Seagull Optimization Algorithm, Salp Swarm Algorithm, Shark Optimization Algorithm, and Bat Algorithm in respective order was 3.25, 3.93, 4.87 and 6.03. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
18
A self-tuning filter-based adaptive linear neuron approach for operation of three-level inverter-based shunt active power filters under non-ideal source voltage conditions
Published 2017“…This paper presents a self-tuning filter (STF)-based adaptive linear neuron (ADALINE) reference current generation algorithm to enhance the operation of a three-phase three-level neutral-point diode clamped (NPC) inverter-based shunt active power filter (SAPF) under non-ideal (unbalanced and/or distorted) source voltage conditions. …”
Get full text
Get full text
Article -
19
A new SMS spam detection method using both Content-Based and non Content-Based features
Published 2024Conference Paper -
20
Optimization Of Pid Controller Using Grey Wolf Optimzer And Dragonfly Algorithm
Published 2018“…Three plant system were used in this study. First system is based on the ball and hoop system and second system is based on the DC servo motor. …”
Get full text
Get full text
Monograph
