Search Results - (( java based verification algorithm ) OR ( basic computing cell algorithm ))
Search alternatives:
- verification algorithm »
- based verification »
- basic computing »
- computing cell »
- cell algorithm »
- java »
-
1
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
2
Development of cell formation algorithm and model for cellular manufacturing system
Published 2011“…Therefore, for this proposes good benchmarked algorithm, bacteria foraging algorithm is selected and developed to solve multiobjective cell formation model and traced constraints satisfaction handling to produce feasible optimal solution. …”
Get full text
Get full text
Thesis -
3
Memory-based Immune Network for Multi-Robot Cooperation
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Multi-Robot Cooperation using Immune Network with Memory
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…For this research, several set of robots by using Lego has been developed and it uses LeJos and C programming techniques as a platform. A Java-based robot development tool has been set up as alternative programming methods incorporating LeJos and the controller. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis -
7
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
A Refined Immune Systems Inspired Model for Multi-Robot Shepherding
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
11
A Refined Immune Systems Inspired Model For Multi-robot Shepherding
Published 2010Get full text
Get full text
Conference or Workshop Item -
12
Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks
Published 2015“…To generate, update and distribute the keys for secure communication over IEEE 802.16e, the MBS applies Multicast and Broadcast Rekeying Algorithm (MBRA) as a basic key management algorithm. …”
Get full text
Get full text
Thesis -
13
