Search Results - (( java implementation a algorithm ) OR ( using function modified algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  5. 5

    Optimization of modified Bouc–Wen model for magnetorheological damper using modified cuckoo search algorithm by Rosmazi, Rosli, Zamri, Mohamed

    Published 2021
    “…The newly proposed algorithm was tested using a set of standard benchmark functions with different searching space and global optima placement. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
    Get full text
    Get full text
    Get full text
    Book
  8. 8
  9. 9

    Estimation of the denitrification in the lower Mississippi Valley by Saleh, Abdul Razak

    Published 2001
    “…The CREAMS denitrification algorithm was modified to account for the high soil moisture conditions by incorporating a water function.The average annual denitrification value simulated by using modified algorithm was higher than the one predicted by CREAMS algorithm.This result is expected because the modified algorithm uses a water function to reflect the degree of soil saturation.…”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…The second agent is a reliability evaluation agent that uses a recursive algorithm to predict the suitability generator based on the frequency and duration reliability indices in each state while the third agent is the storage and transfer of data between the other two agents. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Binary whale optimization algorithm with logarithmic decreasing time-varying modified sigmoid transfer function for descriptor selection problem by Yusof, Norfadzlia Mohd, Muda, Azah Kamilah, Pratama, Satrya Fajri, Carbo-Dorca, Ramon, Abraham, Ajith

    Published 2023
    “…This work introduced a new Binary Whale Optimization Algorithm, which utilized a novel time-varying modified Sigmoid transfer function with a modified logarithmic decreasing time-varying update strategy to improve the balancing of exploration and exploitation in WOA. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    Modified multi-verse optimizer for nonlinear system identification of a double pendulum overhead crane by Julakha, Jahan Jui, Mohd Ashraf, Ahmad, Muhammad Ikram, Mohd Rashid

    Published 2021
    “…In the HMVOSCA algorithm, the new position updating mechanism of the traditional MVO method is modified based on the sine function and cosine function which is taken from the Sine Cosine Algorithm (SCA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Feature fusion using a modified genetic algorithm for face and signature recognition system by Suryanti, Awang

    Published 2015
    “…A modified fitness function in Wrapper GA was introduced by adding a function to maintain the balanced of the selected features. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…The optimization of a computationally intensive algorithm such as this on a mobile platform is challenging due to the limited resources available. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    A modified flower pollination algorithm and carnivorous plant algorithm for solving engineering optimization problem by Ong, Kok Meng

    Published 2021
    “…In this study, two metaheuristic algorithms, namely, modified flower pollination algorithm (MFPA) and carnivorous plant algorithm (CPA), were proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20