Search Results - (( java implementation a algorithm ) OR ( using ((station using) OR (function using)) algorithm ))
Search alternatives:
- java implementation »
- implementation a »
- station using »
- a algorithm »
-
1
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
2
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
3
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020“…The algorithm chosen was implemented using Java Programming language and was tested using Root Means Square Error (RMSE) formula.…”
Get full text
Get full text
Thesis -
5
Songs Search Using Human Humming Voice
Published 2007“…Java programming language is used to build the system. …”
Get full text
Get full text
Final Year Project -
6
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
7
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
Get full text
Get full text
Thesis -
8
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. The image clustering is major part of data mining where study about how to binds the similar data together in a cluster and show the meaningful data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
10
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
Get full text
Get full text
Get full text
Article -
11
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…In this study, the Station-to-Station protocol will use three (3) prime numbers Multi-Prime RSA Digital Signature. …”
Get full text
Get full text
Student Project -
12
Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm
Published 2020“…The Gradient-Based Cuckoo Search (GBCS) algorithm was used to achieve the final objective. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
14
Application of Lamport Digital Signature Scheme into the station-to-station protocol / Md Nizam Udin … [et al.]
Published 2022“…The results from the study are STS protocol algorithms that provide a verification scheme using the Lamport Digital Signature Scheme. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Sustainable Management Of River Water Quality Using Artificial Intelligence Optimisation Algorithms
Published 2021“…Among the hybrid models, in terms of accuracy, the best optimisation algorithm at station 1K06 was the AMFO while the best optimisation algorithm at station 1K07 was the HPSOGA. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Design and development of an intelligent battery charger station
Published 2009“…There are four basic charging algorithm used in this charger: slow (10%C), soft (20%C), fast (55%C) and trickle (4%C). …”
Get full text
Get full text
Monograph -
18
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
19
Network monopoly / Tan Kean Yeap
Published 2002“…The algorithm design and implementation method mustnot only be workable, but also highly efficient in terms of execution speed and respond time. …”
Get full text
Get full text
Thesis -
20
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis
