Search Results - (( java application matching algorithm ) OR ( knowledge implementation modified algorithm ))
Search alternatives:
- knowledge implementation »
- implementation modified »
- application matching »
- java application »
-
1
-
2
-
3
The effect of total bits and number of LFSRs on the hardware performance of modified A5/1 stream ciphers
Published 2024journal::journal article -
4
Manufacturing process planning optimisation in reconfigurable multiple parts flow lines
Published 2008“…Two modified genetic algorithms are devised and employed to provide the best approximate process planning solution. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Process Planning Optimization In Reconfigurable Manufacturing Systems
Published 2008“…The five (5) AADTs include; a variant of the simulated annealing algorithm that implements heuristic knowledge at critical decision points, two (2) cooperative search schemes based on a “loose hybridization” of the Boltzmann Machine algorithm with (i) simulated annealing, and (ii) genetic algorithm search techniques, and two (2) modified genetic algorithms. …”
Get full text
Get full text
Thesis -
7
Image Based Congestion Detection Algorithms And Its Real Time Implementation
Published 2015“…The methodology includes vehicle detection by using backlight pairing feature algorithm and modified Watershed algorithm. The results returned by the algorithms are transmitted and received wirelessly using the SFFSDR platform, including the use of RF, FPGA, and DSP modules for variable distances. …”
Get full text
Get full text
Thesis -
8
-
9
-
10
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
11
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The result will also produce the algorithm for implementing Multi Prime RSA cryptosystem into Station-to-Station protocol. …”
Get full text
Get full text
Student Project -
13
Security analysis of data transmission in an IoT based platform for telemedicine
Published 2021“…This study proposes a modified folded pipeline architecture for resource restriction applications with an AES algorithm. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line
Published 2020“…The hybrid Wavelet Multiresolution Analysis and Machine learning algorithm (WMRA-ML) is used to extracts the useful hidden knowledge from decomposed one-cycle fault transient signals (voltage & current) from four Matlab/Simulink CIGRE models. …”
Get full text
Get full text
Thesis -
16
Investigation On Optical Fibre Configurations For Process Tomography
Published 2002“…Linear back projection (LBP) algorithm is used to reconstruct the image. A modified reconstruction algorithm combining LBP and a priori knowledge is outlined. …”
Get full text
Get full text
Get full text
Article -
17
-
18
Effect Of The Number Of Tapping Bits Of The A5/1 Stream Cipher Towards Hardware Performance
Published 2024“…Objective: In this paper, two modified designs proposed by the author are implemented into hardware and the resulting rate of power consumption is compared with that of the conventional design of the A5/1 stream cipher. …”
Get full text
Article -
19
Computation of Maass Cusp Forms on Singly Punctured Two-Torus and Triply Punctured Two-Sphere Using Mathematica
Published 2009“…All the computations were implemented in Mathematica and built in a way accessible to any one with an introductory knowledge in Mathematica. …”
Get full text
Get full text
Thesis -
20
