Search Results - (( java implementation mechanism algorithm ) OR ( using vector causing algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The correctness of the proposed protocol is demonstrated in a simulation model developed in JAVA TCP/IP socket. Next, the proposed protocol is implemented in RFID system including IAIK UHF Demo tag, TagSense Nano-UHF reader and back-end database. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Lightning Fault Classification for Transmission Line Using Support Vector Machine by Asman S.H., Aziz N.F.A., Kadir M.Z.A.A., Amirulddin U.A.U., Roslan N., Elsanabary A.

    Published 2024
    “…In this study, two machine learning algorithms, Support Vector Machine (SVM) and k-Nearest Neighbor (kNN), were used and compared to classify faults due to lightning strikes, insulator failure, tree and crane encroachment. …”
    Conference Paper
  5. 5

    Implementation of RIO in UMJaNetSim / Chan Chin We by Chan, Chin We

    Published 2004
    “…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
    Get full text
    Get full text
    Thesis
  6. 6

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  7. 7

    Distance vector-hop range-free location algorithm for wireless sensor network by Zazali, Azyyati Adiah

    Published 2015
    “…Distance Vector-Hop (DV-Hop) algorithm has become the focus of studies for range-free localization algorithms. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Lightning fault classification for transmission line using support vector machine by Asman, Saidatul Habsah, Ab Aziz, Nur Fadilah, Ab Kadir, Mohd Zainal Abidin, Ungku Amirulddin, Ungku Anisa, Roslan, Nurzanariah, Elsanabary, Ahmed

    Published 2023
    “…In this study, two machine learning algorithms, Support Vector Machine (SVM) and k-Nearest Neighbor (kNN), were used and compared to classify faults due to lightning strikes, insulator failure, tree and crane encroachment. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Landslide risk zoning using support vector machine algorithm by Ghiasi V., Pauzi N.I.M., Karimi S., Yousefi M.

    Published 2024
    “…The weighted maps were then combined using the support vector machine algorithm. For the training and testing of the machine, 81 slippery ground points and 81 non-sliding points were used. …”
    Article
  10. 10

    Short term forecasting based on hybrid least squares support vector machines by Zuriani, Mustaffa, M. H., Sulaiman, Ernawan, Ferda, Noorhuzaimi, Mohd Noor

    Published 2018
    “…In this study, hybrid Least Squares Support Vector Machines (LSSVM) with four meta-heuristic algorithms viz. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Performance of Ad-Hoc on-Demand Distance Vector Discovery Algorithms Based On Packet Lifetime by Ahmad, Noor Azlan

    Published 2008
    “…The performance analysis of the proposed algorithms was conducted by using the discrete-event simulator, OMNeT++. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Improving Class Timetabling using Genetic Algorithm by Qutishat, Ahmed Mohammed Ali

    Published 2006
    “…Hence, the major aim of this research is to investigate the internal mechanism of genetic algorithm in solving and improving class timetabling problem. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Extending the decomposition algorithm for support vector machines training by Zaki, N,M., Deris, S., Chin, K.K.

    Published 2003
    “…The Support Vector Machine (SVM) is found to de a capable learning machine. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Real-Time Optimal Trajectory Correction (ROTC) for autonomous quadrotor / Noorfadzli Abdul Razak by Abdul Razak, Noorfadzli

    Published 2018
    “…There are two stages implicated in the algorithm. First stage comprises a deviation scheme used to sense a deviation via an accelerometer and formulates a vector by applying double integration techniques fused with Kalman’s Filter (KF). …”
    Get full text
    Get full text
    Thesis
  16. 16

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18
  19. 19

    Hybridization Of Optimized Support Vector Machine And Artificial Neural Network For The Diabetic Retinopathy Classification Problem by Kader, Nur Izzati Ab

    Published 2019
    “…Due to the success of many classification problems been proposed with good result, k-Nearest Neighbour, Artificial Neural Network, and Support Vector Machine algorithms are used in this research.…”
    Get full text
    Get full text
    Thesis
  20. 20