Search Results - (( java implementation _ algorithm ) OR ( loading classification system algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Intuitive content management system via manipulation and duplication with if-else rules classification by Chan, Chung Hoong

    Published 2018
    “…As a result, ICMS can transform dynamic websites into static websites with faster load speed using manipulation method mixed with data mining classification prediction and Boyer-Moore Horspool algorithm which can be classified, edited, adjustable and searched more precisely. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  4. 4

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  5. 5

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Review of Plug-Based Load Energy Management Systems (PLEMS) for energy and comfort management of buildings by Amin, F.B.M., Mahmood, A.K.

    Published 2016
    “…This paper reviews the goals of PLEMS, along with related definitions, classification of PLEMS equipments and PLEMS control systems. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Dynamic load balancing policy in grid computing with multi-agent system integration by Yahaya, Bakri, Latip, Rohaya, Othman, Mohamed, Abdullah, Azizol

    Published 2011
    “…The unique capabilities offered by multi-agent systems can be integrated or combined with the structure of dynamic load balancing to produce a better strategy to produce a better dynamic load balancing algorithm with multi-agent systems.…”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
    Get full text
    Get full text
    Get full text
    Book
  11. 11

    Power system security assessment using artificial neural network: article / Mohd Fathi Zakaria by Zakaria, Mohd Fathi

    Published 2010
    “…Extensive testing and training of the proposed ANN based apprnach indicates its viability for power system steady state stability classification assessment.…”
    Get full text
    Get full text
    Article
  12. 12

    Development of Phasor Measurement Unit Based Fault Detection and Faulty Line Classification in Electrical Power System by Muhammad Qasim, Khan

    Published 2019
    “…This study first focuses on modifying the PMU model for standard test systems in a MATLAB Simulink environment. This model implements Non-Recursive Phasor Estimation (NRPE) algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Dynamic load balancing policy with communication and computation elements in grid computing with multi-agent system integration by Yahaya, Bakri, Latip, Rohaya, Othman, Mohamed, Abdullah, Azizol

    Published 2011
    “…The unique capabilities offered by multi-agent systems can be integrated or combined with the structure of dynamic load balancing to produce a better strategy and better load balancing algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Assessment of cognitive load using multimedia learning and resting states with deep learning perspective by Qayyum, A., Faye, I., Malik, A.S., Mazher, M.

    Published 2019
    “…The results shows that alpha brain wave produced consistent behavior using for all cognition tasks based on pre-trained CNN models for classification and cognitive load assessment. © 2018 IEEE…”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An optimal under frequency load shedding scheme for islanded distribution network / Amalina Izzati Md Isa by Md Isa, Amalina Izzati

    Published 2018
    “…Two new algorithms i.e., Load Classification based Fuzzy Logic (LCFL) and Binary Evolutionary Programming (BEP) are introduced in the module. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Load balancing and server consolidation in cloud computing environments: a meta-study by Fadhil, Mohammed Alaa, Othman, Mohamed

    Published 2019
    “…This meta-study, reviews the literature on load balancing and server consolidation and presents a ready reference taxonomy on the most efficient algorithms that achieve load balancing and server consolidation. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Development of electromyography-controlled 3D printed robot hand and supervised machine learning for signal classification by Abdul Wahit, Mohamad Aizat

    Published 2019
    “…The current study of the hand posture classification requires a higher number of EMG sensor used to achieve an accurate classification performance that leads the system to be complicated. …”
    Get full text
    Get full text
    Thesis
  20. 20

    An application of a novel technique for assessing the operating performance of existing cooling systems on a university campus by Abdalla, E.A.H., Nallagownden, P., Nor, N.B.M., Romlie, M.F., Hassan, S.M.

    Published 2018
    “…Two contributions in this work are: (1) the prediction of a model by using Adaptive Neuro-Fuzzy Inference System (ANFIS)-based Fuzzy Clustering Subtractive (FCS), and (2) the classification and optimization of the predicted models by using an Accelerated Particle Swarm Optimization (APSO) algorithm. …”
    Get full text
    Get full text
    Article