Search Results - (( java implementation change algorithm ) OR ( program implementation 5s algorithm ))
Search alternatives:
- program implementation »
- implementation change »
- java implementation »
- implementation 5s »
- change algorithm »
- 5s algorithm »
-
1
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
2
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
3
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…This tool can be an educational assistant for beginners to learn metaheuristic in theoretical lectures as well as practical sessions. Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Implementation of color filtering on FPGA
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Implementation of repetitive control algorithm in reducing vibration using MATLAB/SIMULINK / Mohamad Zuhairy Mohamed
Published 2008“…MATLAB programming is sue to design the repetitive controller after that its implement to the SIMULINK software. …”
Get full text
Get full text
Student Project -
6
-
7
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
8
Control algorithm for two-tank system using multiparametric programming
Published 2023Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
-
11
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The aim of this paper is implementation of system computation between Cryptography and Steganography which embeds information in unused area 2 within EXE files to find a secure solution to cover file without change the size of cover file. …”
Get full text
Get full text
Get full text
Article -
12
Reusability techniques in load-flow analysis computer program
Published 2004Get full text
Get full text
Article -
13
-
14
Three-probe reflectometer algorithm for calculation of complex reflection coefficient of liquids / Aidil Saifan Abu Bakar
Published 2003“…This paper describes a technique for measurement of complex reflection coefficient of liquids using slotted line (implemented in waveguide form). In order to make precision measurement of magnitude and phase of reflection coefficient, the Three-Probe Reflectometer Algorithm has been used (which was implemented on the personal computer using Visual Basic 6 programming). …”
Get full text
Get full text
Thesis -
15
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
16
-
17
Integrated Optimization Algorithm in Solving Economic Dispatch Problems
Published 2024Conference Paper -
18
-
19
-
20
