Search Results - (( java data compression algorithm ) OR ( construct validation a algorithm ))
Search alternatives:
- construct validation »
- data compression »
- validation a »
- a algorithm »
- java »
-
1
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
2
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
3
Design and analysis of construction and recombination module using Idury Waterman Algorithm for fragment assembly application / Hafifi Mohd Rafi
Published 2012“…The result of the proposed algorithm, verifies the validity of proposed algorithm.…”
Get full text
Get full text
Thesis -
4
Landslide susceptibility mapping at VAZ watershed (Iran) using an artificial neural network model: a comparison between multilayer perceptron (MLP) and radial basic function (RBF)...
Published 2013“…Finally the landslide susceptibility maps were validated using the validation data (i.e., 30 % landslide location data that was not used during the model construction) using area under the curve (AUC) method. …”
Get full text
Get full text
Article -
5
The Construction Of Quantum Block Cipher For Grover Algorithm
Published 2018Get full text
Get full text
Thesis -
6
Strategies for effective value management practice in construction industry
Published 2017“…The objectives were to develop a new optimisation algorithm and apply the results to control construction project costs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…This research proposed a new Key Schedule Algorithm based on the coordinate geometry of a Hybrid Cube (KSAHC) for the non-binary block cipher. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
A multi-depot vehicle routing problem with stochastic road capacity and reduced two-stage stochastic integer linear programming models for rollout algorithm
Published 2021“…The proposed approach is suitable for obtaining a policy constructed dynamically on the go during the rollout algorithm. …”
Get full text
Get full text
Article -
9
A Distributed Energy Aware Connected Dominating Set Technique for Wireless Sensor Networks
Published 2012“…Our algorithm, a single-phase single initiator (SPSI), only requires a single phase to construct a CDS in a distributed manner using localized information. …”
Get full text
Get full text
Conference or Workshop Item -
10
-
11
-
12
A Comparison Study On Pca_Modular Pca And Lda For Face Recognition
Published 2017Get full text
Get full text
Monograph -
13
A self-adaptive agent-based simulation modelling framework for dynamic processes
Published 2023“…Key parameters for dynamic processes of different domains were formulated for the construction of self-adaptive simulation algorithms and modelling. …”
text::Thesis -
14
Hyper-Heuristic Evolutionary Approach for Constructing Decision Tree Classifiers
Published 2021“…Finding optimal values for the hyper parameters of a decision tree construction algorithm is a challenging issue. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
SecPath: Energy efficient path reconstruction in wireless sensor network using iterative smoothing
Published 2019“…To achieve energy efficiency, it compresses the packet information by using GZIP tools in JAVA. …”
Get full text
Get full text
Thesis -
16
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
Get full text
Get full text
Get full text
Thesis -
17
Improved dung beetle optimization algorithm and finite element analysis for spindle optimization
Published 2024“…The ensuing FEA produces a foundation for constructing a response surface, further optimized to refine the initial design. …”
Get full text
Get full text
Get full text
Article -
18
A genetic algorithm approach to VLSI macro cell non-slicing floorplans using binary tree
Published 2008“…Furthermore, the robustness of genetic algorithm also has been investigated in order to validate the performance stability in achieving the optimal solution for every runtime. …”
Get full text
Get full text
Conference or Workshop Item -
19
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…In order to more effectively incorporate both present technology and developing technology, models of DNA cryptography need to be developed. MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. …”
Get full text
Get full text
Get full text
Thesis -
20
