Search Results - (( java implementation model algorithm ) OR ( data estimation means algorithm ))
Search alternatives:
- implementation model »
- java implementation »
- estimation means »
- model algorithm »
- data estimation »
- means algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
2
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
3
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
4
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis -
5
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
Get full text
Get full text
Conference or Workshop Item -
6
Parameter Estimation of Lorenz Attractor: A Combined Deep Neural Network and K-Means Clustering Approach
Published 2022“…After that, it has been suggested to improve the efficiencies in the Deep Neural Network (DNN) model by combining the DNN with an unsupervised machine learning algorithm, the K-Means clustering algorithm. This study constructs the flow of DNN based method with the K-Means algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems
Published 2013“…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
Get full text
Get full text
Article -
8
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
9
Reduced Rank Technique for Joint Channel Estimation and Joint Data Detection in TD-SCDMA Systems
Published 2012“…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
Get full text
Get full text
Article -
10
System identification using Extended Kalman Filter
Published 2017“…Besides, Extended Kalman Filter (EKF) algorithm was selected in this project as an algorithm for offline estimation data purposes. …”
Get full text
Get full text
Student Project -
11
Reduced-rank technique for joint channel estimation in TD-SCDMA systems.
Published 2013“…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
Get full text
Get full text
Article -
12
-
13
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
14
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
15
Statistical data preprocessing methods in distance functions to enhance k-means clustering algorithm
Published 2018“…It is attained successfully by combining the mean in K-Means algorithm, minimum and maximum in K-Midranges algorithm and compute their average as mean cluster of Hybrid mean. …”
Get full text
Get full text
Get full text
Thesis -
16
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…The first research objective is to develop a new deep learning algorithm by a hybrid of DNN and K-Means Clustering algorithms for estimating the Lorenz chaotic system. …”
Get full text
Get full text
Thesis -
17
Model selection approaches of water quality index data
Published 2016Get full text
Get full text
Get full text
Article -
18
Modified artificial neural network (ANN) models for Malaysian construction costs indices (MCCI) data / Saadi Ahmad Kamaruddin
Published 2018“…Theoretically, the most common algorithm to train the network is the backpropagation (BP) algorithm which is based on the minimization of the ordinary least squares (LS) estimator in terms of mean squared error (MSE). …”
Get full text
Get full text
Book Section -
19
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
20
An improvement of stochastic gradient descent approach for mean-variance portfolio optimization problem
Published 2021“…,e application of SGD, Adam, adaptive moment estimation with maximum (AdaMax), Nesterov-accelerated adaptive moment estimation (Nadam), AMSGrad, and AdamSE algorithms to solve the meanvariance portfolio optimization problem is further investigated. …”
Get full text
Get full text
Get full text
Article
