Search Results - (( java implementation _ algorithm ) OR ( using solving delay algorithm ))

Refine Results
  1. 1
  2. 2

    Predictor-corrector scheme in modified block method for solving delay differential equations with constant lag by Abdul Aziz, Nurul Huda, Abdul Majid, Zanariah, Ismail, Fudziah

    Published 2014
    “…In this paper, the numerical solution of delay differential equations using a predictor-corrector scheme in modified block method is presented. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Block multistep methods for solving first order retarded and neutral delay differential equations by Abdul Aziz, Nurul Huda

    Published 2015
    “…A new subroutine function has been added in the developed algorithm with the capabilities to approximate the neutral delay term using the interpolation of function evaluation. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Predictor-corrector scheme in modified block method for solving delay differential equations with constant lag by Nurul Huda Abdul Aziz, Zanariah Abdul Majid, Fudziah Ismail

    Published 2014
    “…In this paper, the numerical solution of delay differential equations using a predictor-corrector scheme in modified block method is presented. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    One-step block methods for solving ordinary and delay differential equations by Mohd Radzi, Hazwani

    Published 2011
    “…Subsequently, the codes were then adapted to solve first order DDEs and the delay term is approximated using Neville’s interpolation. …”
    Get full text
    Get full text
    Thesis
  6. 6

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Solving delay differential equations using modified 2-point block method by Abdul Aziz, Nurul Huda, Abdul Majid, Zanariah

    Published 2012
    “…The Newton divided difference interpolation has been used to approximate the delay solutions and the algorithm is implemented in variable step size. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Multistep block methods for solving higher order delay differential equations by Hoo, Yann Seong

    Published 2016
    “…The delay term in DDEs with constant delays is approximated using Hermite interpolation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Adam’s type block methods for solving neutral delay differential equation with constant and panthograph delay by Ismail, Nur Inshirah Naqiah

    Published 2019
    “…The multistep block methods will be implemented in solving NDDE with constant and pantograph delay types using constant step size. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Solving delay differential equations (DDEs) using nakashima's 2 stages 4th order Pseudo-Runge-Kutta method by Ayunni Sarbi N.A., Bin Mamat M.B.

    Published 2013
    “…This paper is investigate numerically the problem on solving Delay Differential Equations (DDEs) using Nakashima’s 2 Stages 4th Order Pseudo-Runge-Kutta Method and also developed the algorithm of Nakashima’s 2 Stages 4th Order Pseudo-Runge-Kutta Method incorporates with Hermite Interpolation. …”
    Get full text
    Non-Indexed Article
  11. 11
  12. 12
  13. 13

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  14. 14

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  15. 15

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Performance of Ad-Hoc on-Demand Distance Vector Discovery Algorithms Based On Packet Lifetime by Ahmad, Noor Azlan

    Published 2008
    “…The performance analysis of the proposed algorithms was conducted by using the discrete-event simulator, OMNeT++. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
    Get full text
    Get full text
    Get full text
    Book