Search Results - (( java implementation _ algorithm ) OR ( using complex machine algorithm ))
Search alternatives:
- java implementation »
- machine algorithm »
- using complex »
-
1
Biometrics electronic purse
Published 1999“…A simple PIN code verlfication is no longer suflcient and would require a more complex and fools proof authentication method. A 56-bit DES encryption algorithm can easily be broken in just 2 to 3 days using the EFF DES CRACKER, an unclassified ASIC machine. …”
Get full text
Get full text
Get full text
Proceeding Paper -
2
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
5
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
6
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
7
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…Furthermore, the proposed scheme's performance and complexity are evaluated using the JPBC cryptographic library. …”
Get full text
Get full text
Thesis -
8
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
9
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
10
-
11
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
12
The Implementation of a Machine Learning-based Routing Algorithm in a Lab-Scale Testbed
Published 2024“…Thus, researchers are developing intelligent RAs, including machine learning (ML)-based algorithms to meet traffic Q oS r equirements. …”
Conference Paper -
13
Optimization of multi-holes drilling toolpath using tiki-taka algorithm
Published 2024“…The study aims to model the MDMT toolpath using the Traveling Salesman Problem (TSP) concept, apply TTA to optimize this model, and validate the model and algorithm through machining experiments on this problem. …”
Get full text
Get full text
Thesis -
14
Propose a New Machine Learning Algorithm based on Cancer Diagnosis
Published 2018“…Moreover, there are different reasons for using these algorithms such as the ability of machine learning to detect main features from complex data sets, which represents techniques have been utilized as an aim to model the progression and treatment of cancerous conditions. …”
Get full text
Get full text
Get full text
Article -
15
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
16
-
17
A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works
Published 2023Conference Paper -
18
Fuzzy Rules Optimization in Fuzzy Expert System for Machinability Data Selection: Genetic Algorithms Approach
Published 2001“…Machinability data selection is complex and cannot be easily formulated by any mathematical model to meet design specification. …”
Get full text
Get full text
Article -
19
Optimization of Machining Parameters in Turning Operation Using PSO and AIS Algorithms: A Survey
Published 2012“…Most papers in the field of turning parameters optimization are based on (PSO) algorithms, but only a few efforts that are using (AIS) algorithms. …”
Get full text
Get full text
Get full text
Article -
20
To study the multi-objective optimization of EDM using genetic algorithm
Published 2013“…In the manufacturing industry, the production and quality of a product is very important, especially when it involves the big industries EDM. A machine such as EDM (electro discharge machine) used to produce a product that require an accurate product quality. …”
Get full text
Get full text
Undergraduates Project Papers
