Search Results - (( java implementation mechanism algorithm ) OR ( framework implementation model algorithm ))

Refine Results
  1. 1

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The correctness of the proposed protocol is demonstrated in a simulation model developed in JAVA TCP/IP socket. Next, the proposed protocol is implemented in RFID system including IAIK UHF Demo tag, TagSense Nano-UHF reader and back-end database. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Implementation of RIO in UMJaNetSim / Chan Chin We by Chan, Chin We

    Published 2004
    “…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
    Get full text
    Get full text
    Thesis
  7. 7

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  8. 8

    Rapid software framework for the implementation of machine learning classification models by Rahman, A.S.A., Masrom, S., Rahman, R.A., Ibrahim, R.

    Published 2021
    “…The results indicated that although the software framework is easier than the programming platform for implementing the machine learning model, the results from the software framework were highly accurate and reliable. …”
    Get full text
    Get full text
    Article
  9. 9

    An intelligent framework for modelling and active vibration control of flexible structures by Mohd. Hashim, Siti Zaiton

    Published 2004
    “…The first controller design is formulated so as to allow on-line modeling, controller design and implementation and thus, yield a self-tuning control algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Edge assisted crime prediction and evaluation framework for machine learning algorithms by Adhikary, Apurba, Murad, Saydul Akbar, Munir, Md Shirajum, Choong Seon, Hong Seong

    Published 2022
    “…In particular, this study proposes a crime prediction and evaluation framework for machine learning algorithms of the network edge. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13
  14. 14

    Improving Class Timetabling using Genetic Algorithm by Qutishat, Ahmed Mohammed Ali

    Published 2006
    “…Hence, the major aim of this research is to investigate the internal mechanism of genetic algorithm in solving and improving class timetabling problem. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Enhanced Community Detection Based On Cross Time For Higher Visibility In Supply Chain: A Six-Steps Model Framework by Abal Abas, Zuraida, Mohd Zaki, Nurul Hafizah, Asmai, Siti Azirah, Abdul Rahman, Ahmad Fadzli Nizam, Zainal Abidin, Zaheera

    Published 2019
    “…The expected result shows that the Enhanced Temporal Community Detection Algorithm based on Cross Time approach for higher visibility in supply chain network is the major finding when implementing this proposed framework. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Bayesian inference for the bivariate extreme model by Mohd Amin, Nor Azrita, Adam, Mohd Bakri

    Published 2016
    “…The model is used in a Bayesian framework where no information of prior is available on unknown model parameters. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Interactive framework for dynamic modelling and active vibration control of flexible structures by Mat Darus, Intan Zaurah, Mohd. Hashim, Siti Zaiton, Tokhi, M. O.

    Published 2008
    “…Controller-design strategies, parametric as well as nonparametric, are integrated within this framework. The design and implementation of the interactive learning system incorporating the simulation algorithms, modelling and control strategies, are developed using MATLAB. …”
    Get full text
    Get full text
    Article
  18. 18

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Application Of The Blockchain Technology Within Healthcare by Lin, Michelle Hwei Yee

    Published 2021
    “…Finally, the constructed predictive model is implemented along with the proposed application, which connects all groups of participants with the blockchain-based EMR system.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis