Search Results - (( java implementation a algorithm ) OR ( using solving delay algorithm ))

Refine Results
  1. 1
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Predictor-corrector scheme in modified block method for solving delay differential equations with constant lag by Abdul Aziz, Nurul Huda, Abdul Majid, Zanariah, Ismail, Fudziah

    Published 2014
    “…In this paper, the numerical solution of delay differential equations using a predictor-corrector scheme in modified block method is presented. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Block multistep methods for solving first order retarded and neutral delay differential equations by Abdul Aziz, Nurul Huda

    Published 2015
    “…A new subroutine function has been added in the developed algorithm with the capabilities to approximate the neutral delay term using the interpolation of function evaluation. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Predictor-corrector scheme in modified block method for solving delay differential equations with constant lag by Nurul Huda Abdul Aziz, Zanariah Abdul Majid, Fudziah Ismail

    Published 2014
    “…In this paper, the numerical solution of delay differential equations using a predictor-corrector scheme in modified block method is presented. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    One-step block methods for solving ordinary and delay differential equations by Mohd Radzi, Hazwani

    Published 2011
    “…Subsequently, the codes were then adapted to solve first order DDEs and the delay term is approximated using Neville’s interpolation. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Solving delay differential equations using modified 2-point block method by Abdul Aziz, Nurul Huda, Abdul Majid, Zanariah

    Published 2012
    “…The Newton divided difference interpolation has been used to approximate the delay solutions and the algorithm is implemented in variable step size. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  11. 11

    Multistep block methods for solving higher order delay differential equations by Hoo, Yann Seong

    Published 2016
    “…The delay term in DDEs with constant delays is approximated using Hermite interpolation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Adam’s type block methods for solving neutral delay differential equation with constant and panthograph delay by Ismail, Nur Inshirah Naqiah

    Published 2019
    “…The multistep block methods will be implemented in solving NDDE with constant and pantograph delay types using constant step size. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Solving delay differential equations (DDEs) using nakashima's 2 stages 4th order Pseudo-Runge-Kutta method by Ayunni Sarbi N.A., Bin Mamat M.B.

    Published 2013
    “…This paper is investigate numerically the problem on solving Delay Differential Equations (DDEs) using Nakashima’s 2 Stages 4th Order Pseudo-Runge-Kutta Method and also developed the algorithm of Nakashima’s 2 Stages 4th Order Pseudo-Runge-Kutta Method incorporates with Hermite Interpolation. …”
    Get full text
    Non-Indexed Article
  14. 14
  15. 15

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17
  18. 18

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
    Get full text
    Get full text
    Get full text
    Book
  19. 19

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  20. 20

    Performance of Ad-Hoc on-Demand Distance Vector Discovery Algorithms Based On Packet Lifetime by Ahmad, Noor Azlan

    Published 2008
    “…The performance analysis of the proposed algorithms was conducted by using the discrete-event simulator, OMNeT++. …”
    Get full text
    Get full text
    Thesis