Search Results - (( java implementation new algorithm ) OR ( based computing knowing algorithm ))
Search alternatives:
- java implementation »
- implementation new »
- computing knowing »
- knowing algorithm »
- based computing »
- new algorithm »
-
1
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
Review -
5
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
6
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
7
Biometrics electronic purse
Published 1999“…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
-
9
Signal detection algorithm for cognitive radio using singular value decomposition
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
10
-
11
-
12
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…The proposed algorithms (Priority Dynamic Quantum Time and Multi Priority Dynamic Quantum Time Algorithms) are implemented using JAVA programming language and validated using Key Performance Indicators equations. …”
Get full text
Get full text
Thesis -
13
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
Get full text
Get full text
Thesis -
14
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
15
-
16
How are exponents used in real-world situations? / Nurul Aityqah Yaacob
Published 2023“…You also need to understand the logic behind algorithms and the order of the number system. Students typically multiply the base by the exponent, for instance, while computing the numerical value of an exponential equation. …”
Get full text
Get full text
Monograph -
17
Agent-based extraction algorithm for computational problem solving
Published 2015“…On the other hand, agent-based model offers a good method to solve complex computational problems. …”
Get full text
Get full text
Thesis -
18
SVD-based signal detector for cognitive radio networks
Published 2011“…This paper examines the implementation of the Singular Value Decomposition (SVD) method to detect the presence of wireless signal.The method is used to find the maximum and minimum eigenvalues.We simulated the algorithm using common digital signal in wireless communication namely rectangular pulse shape, raised cosine and root-raised cosine to test the performance of the signal detector.The SVD-based signal detector was found to be more efficient in sensing signal without knowing the properties of the transmitted signal.The execution time is acceptable compared to the favorable energy detection.The computational complexity of SVD-based detector is medium compared to the energy detector.The algorithm is suitable for blind spectrum sensing where the properties of the signal to be detected are unknown. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
-
20
A quick gbest guided artificial bee colony algorithm for stock market prices prediction
Published 2018“…In this respect, in the present manuscript, we propose an algorithm based on ABC to minimize the error in the trend and actual values by using the hybrid technique based on neural network and artificial intelligence. …”
Get full text
Get full text
Article
