Search Results - (( java implementation models algorithm ) OR ( using restoration techniques algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  3. 3

    Image restoration techniques for removal of blurred images / Ameer Naeemi Zyarah by Ameer, Naeemi Zyarah

    Published 2017
    “…These degraded images are then restored with the derived image restoration techniques. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Multi-objective service restoration in distribution networks using genetic algorithm by Moazami, Ehsan

    Published 2013
    “…This thesis presents a new approach of supply restoration service using the Genetic Algorithm. The GA is robust in searching a global optimal solution for the large-scale combinatorial optimization problems. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Optimal penalty method in distribution service restoration using genetic algorithm by Moazami, Ehsan, Ab Kadir, Mohd Zainal Abidin, Hizam, Hashim, Izadi, Mahdi, Mirzaei, Maryam

    Published 2013
    “…This study presents a new approach of supply restoration service using the Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal by Zainal, Mohamad Izwan

    Published 2022
    “…Later, this MOCSSA is applied on service restoration to ensure the proposed algorithm technique is suitable in selecting the optimal switches for supply recovery after the line section is isolated from the system either by forced outage or planned outage purposes. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  10. 10
  11. 11

    Detection and restoration of cracked digitized paintings and manuscripts using image processing by Farajalla Ali, Nawafil Abdulwahab, Taha Alshaikhli, Imad Fakhri, Hassan, Raini

    Published 2018
    “…There are different techniques and methodologies that can be used to conserve and restore the overall quality of these images. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15
  16. 16

    Dynamic voltage restorer for voltage sag compensation by Ramasamy A.K., Iyer R.K., Ramachandaramuthy V.K., Mukerjee R.N.

    Published 2023
    “…The DVR control system is described and verified using simulation. The control algorithm implemented using DSP was tested using generated input voltage signals and the results are also presented. …”
    Conference paper
  17. 17

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…In order to solve it, Bat Algorithm method is implement in to optimization method in fuzzy modeling for classification. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib by Dian Najihah , Abu Talib

    Published 2019
    “…There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Three phase inverter control using DSP controller for dynamic voltage restorer (DVR) application by Omar, Rosli, Rahim, Nasrudin

    Published 2011
    “…This paper discusses the control technique improvement of a three-phase inverter using directquadrature- zero (d-q-0) controller based on DSP TMS320F2812 for dynamic voltage restorer (DVR) applications. …”
    Get full text
    Get full text
    Get full text
    Article