Search Results - (( java implementation mechanism algorithm ) OR ( using factor causing algorithm ))
Search alternatives:
- implementation mechanism »
- java implementation »
- mechanism algorithm »
- causing algorithm »
- factor causing »
- using factor »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The correctness of the proposed protocol is demonstrated in a simulation model developed in JAVA TCP/IP socket. Next, the proposed protocol is implemented in RFID system including IAIK UHF Demo tag, TagSense Nano-UHF reader and back-end database. …”
Get full text
Get full text
Thesis -
4
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
5
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
Review -
6
Improving Class Timetabling using Genetic Algorithm
Published 2006“…Hence, the major aim of this research is to investigate the internal mechanism of genetic algorithm in solving and improving class timetabling problem. …”
Get full text
Get full text
Get full text
Thesis -
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
8
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006Get full text
Get full text
Get full text
Conference or Workshop Item -
9
The use of Cox regression and genetic algorithm (CoRGA) for identifying risk factors for mortality in older people
Published 2004“…This article describes ongoing research to overcome these limitations through the CoRGA program, which combines Cox regression with a genetic algorithm for the variable selection process. CoRGA was used to try and identify the best combination of risk factors for 4-year all-cause mortality. …”
Get full text
Get full text
Get full text
Article -
10
-
11
-
12
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
13
Three-term backpropagation algorithm for classification problem
Published 2006“…Standard Backpropagation Algorithm (BP) is a widely used algorithm in training Neural Network that is proven to be very successful in many diverse application. …”
Get full text
Get full text
Thesis -
14
Determination of dengue hemorrhagic fever disease factors using neural network and genetic algorithms / Yuliant Sibaroni, Sri Suryani Prasetiyowati and Iqbal Bahari Sudrajat
Published 2020“…In this study, the problem of determination dengue disease factors was modeled using a neural network. The activation function in this neural network model then estimated using genetic algorithms. …”
Get full text
Get full text
Get full text
Article -
15
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
Published 2016“…In addition, exponential growth of data causes high computational costs in Apriori-like algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Range sensor based local path planning algorithm for mobile robot in unknown static environment with beacon / Wan Ahmad Jailani Wan Ngah
Published 2013“…PointsBug is then compared with TangentBug because it is the best among The Bug Algorithm family using the range sensor for distance, duration, speed and reachability.…”
Get full text
Get full text
Thesis -
17
Comparison between clustering algorithm for rainfall analysis in Kelantan / Wan Nurshazelin Wan Shahidan and Siti Nurasikin Abdullah
Published 2017“…So, in this study clustering algorithm on rainfall distribution dataset is done using WEKA 3.8 software. …”
Get full text
Get full text
Get full text
Article -
18
The implementation of crossover factor, f TIG in the finite persisting sphere genetic algorithm
Published 2023“…In this paper, a crossover factor, fTIG is introduced to the Finite Persisting Sphere Genetic Algorithm (FPSGA). …”
Conference paper -
19
DRIVER FATIGUE ACCIDENT PREVENTION USING EYE BLINK SENSOR
Published 2013“…After extracting the eye region, the algorithm will be used to detect the duration of each eye blinks in order to detect fatigue.…”
Get full text
Get full text
Final Year Project -
20
Drowsy driver detection using Viola-Jones Algorithm / Wan Nurul Adlina Wan Sallehuddin ... [et al.]
Published 2021“…Drowsy driving is one of the factors that lead to road accidents which can cause dead. …”
Get full text
Get full text
Get full text
Article
