Search Results - (( java implementation cell algorithm ) OR ( java programming between algorithm ))
Search alternatives:
- java implementation »
- implementation cell »
- programming between »
- between algorithm »
- java programming »
- cell algorithm »
-
1
-
2
-
3
Songs Search Using Human Humming Voice
Published 2007“…Java programming language is used to build the system. …”
Get full text
Get full text
Final Year Project -
4
A survey of energy-aware real time scheduling tools
Published 2015“…This criteria is compared between these tools. Java language is observed to dominate the development of these simulation tools.…”
Get full text
Get full text
Conference or Workshop Item -
5
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…Each web services are easily maintainable since there is loose coupling between interacting nodes. The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance
Published 2025“…The research experiment has shown the process of calculating the Distance matrix for the sample Java Programs and subsequent evaluation using the mutation testing approach and APFD calculation. …”
Get full text
Get full text
Get full text
Article -
8
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis
