Search Results - (( java implementation change algorithm ) OR ( program implementation acs algorithm ))
Search alternatives:
- program implementation »
- implementation change »
- java implementation »
- implementation acs »
- change algorithm »
- acs algorithm »
-
1
-
2
-
3
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
4
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…This tool can be an educational assistant for beginners to learn metaheuristic in theoretical lectures as well as practical sessions. Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
-
6
Implementation of real-time simple edge detection on FPGA
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
7
CPLD based controller for single phase inverters
Published 2007“…The involved software, hardware, and suitable algorithm to implement and generate the PWM are developed in details. …”
Get full text
Get full text
Thesis -
8
CPLD based controller for single phase inverters
Published 2007“…The involved software, hardware, and suitable algorithm to implement and generate the PWM are developed in details. …”
Get full text
Get full text
Thesis -
9
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
10
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The aim of this paper is implementation of system computation between Cryptography and Steganography which embeds information in unused area 2 within EXE files to find a secure solution to cover file without change the size of cover file. …”
Get full text
Get full text
Get full text
Article -
11
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
12
Accuracy of advanced deep learning with tensorflow and keras for classifying teeth developmental stages in digital panoramic imaging
Published 2022“…Results: Image segmentation using the DP-AC algorithm enhanced the visibility of the image features in the region of interest while suppressing the image’s background noise. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
14
-
15
The assessment and improvement of angle stability condition of the power system using particle swarm optimization (PSO) technique / Nor Azwan Mohamed Kamari
Published 2016“…In order to accelerate the determination of angle stability, particle swarm optimization (PSO) is proposed to be implemented in this study. The application of the proposed algorithm has been justified as the most accurate with lower computation time as compared to other optimization techniques such as evolutionary programming (EP) and artificial immune system (AIS). …”
Get full text
Get full text
Thesis -
16
Implementation Of SVM For Cascaded H-Bridge Multilevel Inverters Utilizing FPGA
Published 2019“…In recent years the Space Vector Modulation (SVM) technique has gained wide acceptance for many AC drive applications. Further improvements of AC drives can be accomplished by applying SVM in multilevel inverters, since the more suitable voltage vectors can be chosen among larger number of voltage vectors available in the multileve inverter. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Development of multi-objective Chaotic Immune Symbiotic Organisms Search (CISOS) algorithm for facts device installation in voltage security control / Mohamad Khairuzzaman Mohamad...
Published 2019“…In order to mitigate this problem, Flexible AC Transmission System (FACTS) devices can be installed in a power system. …”
Get full text
Get full text
Thesis -
18
The assessment and improvement of angle stability condition of the power system using particle swarm optimization (PSO) technique / Nor Azwan Mohamed Kamari
Published 2017“…In order to accelerate the determination of angle stability, particle swarm optimization (PSO) is proposed to be implemented in this study. The application of the proposed algorithm has been justified as the most accurate with lower computation time as compared to other optimization techniques such as evolutionary programming (EP) and artificial immune system (AIS). …”
Get full text
Get full text
Book Section -
19
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
20
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…TCS attempts to identify test cases that have the same relevance to some set of changes. This technique has the problem of selecting a significant number of test cases even for small changes made to a software. …”
Get full text
Get full text
Thesis
