Search Results - (( java implementation phase algorithm ) OR ( using scheme using algorithm ))
Search alternatives:
- implementation phase »
- java implementation »
- phase algorithm »
- using algorithm »
- using scheme »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
2
Application Of Higher Order Compact Finite Difference Methods To Problems In Fluid Dynamics
Published 2003“…Third, only the numerical algorithm based on Hermitian scheme is used to solve the flow past a backward-facing step. …”
Get full text
Get full text
Thesis -
3
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
4
Post quantum signature schemes for the block chain technology
Published 2019“…First we study the different properties and uses of signature schemes, and how Elliptic Curve Digital Signature Algorithm is used in the blockchain technology. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
Quality of service management algorithms in WiMAX networks
Published 2015“…In addition, an analytical model for the proposed scheme is developed. Secondly, a Load-Aware Weighted Round Robin algorithm (LAWRR) packet scheduling discipline for downlink traffic in 802.16 networks is proposed to improve the poor performance of scheduling algorithm that use static weights under bursty traffic. …”
Get full text
Get full text
Thesis -
6
Application of Mellin-Kamal transformation in EL Gamal Ciphertext Cryptosystem / Nurul Syazwani Husairi and Nurul Aqilah Mohd Fauzi
Published 2023“…El Gamal ciphertext cryptosystem is one of the fluently used algorithms to satisfy the security message or data transmission. …”
Get full text
Get full text
Student Project -
7
A Fast Scheduling Algorithm for WDM Optical Networks
Published 2000“…These schemes use different criteria to select packets from the nodes for scheduling. …”
Get full text
Get full text
Thesis -
8
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…The research goes on to compare the energy consumptions for encryption and decryption using the AAḃ AAp scheme with similar processes using the Textbook RSA scheme on the aforesaid embedded platforms. …”
Get full text
Get full text
Thesis -
9
-
10
Real-time Cascading Reservoirs Operation using the Genetic Algorithm and Seasonally Varied Models
Published 2013“…The fitness function of the genetic algorithm model (GAM) was to minimize the difference between the potential capacity and actual generation of the scheme. …”
Get full text
Get full text
Thesis -
11
Performance analysis of resource allocation downlink for MIMO-OFDMA system using Greedy algorithm. / Azrinawati Samaon
Published 2014“…Simulation results show that the proposed algorithm can improve the capacity of the network compared with the waterfdling when using signal-to-noise ratio (SNR) with value 6dB. …”
Get full text
Get full text
Article -
12
-
13
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…According to the experimental results, the proposed algorithm improves PSNR with at least 5.4 compared to the previous schemes.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Performance analysis of resource allocation downlink for MIMO-OFDMA system using greedy algorithm / Azrinawati Samaon
Published 2016“…Simulation results show that the proposed algorithm can improve the capacity of the network compared with the water-filling when using signal-to-noise ratio (SNR) with value 6dB. …”
Get full text
Get full text
Thesis -
15
A safe overtaking control scheme for autonomous vehicles using rapid-exploration random tree
Published 2022“…The improved algorithm is used to obtain the rough obstacle avoidance of the vehicle. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
16
Efficient algorithms for the key representation auditing scheme.
Published 2009“…Also, cost estimation for this scheme is performed, and we illustrate the saving in block accesses (CPU time) and storage space that are attainable when a KRDB is used.…”
Get full text
Get full text
Citation Index Journal -
17
Iris localisation using Fuzzy Centre Detection (FCD) scheme and active contour snake
Published 2014“…This paper presents a new method to localise iris by using Fuzzy Centre Detection (FCD) scheme and active contour Snake. …”
Get full text
Get full text
Get full text
Article -
18
Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks
Published 2000“…Thirdly, the design and implementation issues have been addressed together with the major drawbacks of the previous schemes and hence two algorithms have been proposed. …”
Get full text
Get full text
Thesis -
19
Optimised intelligent tilt controller scheme using genetic algorithms
Published 2006“…This paper presents work on a fuzzy control design for improving the performance of tilting trains with local-per vehicle control, i.e. without employing precedence control.An optimisation procedure using Genetic Algorithms as employed to determine both the best fuzzy output membership function and best PID controller parameters. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Multigrid solution of Euler equations using high-resolution NVD differencing scheme for unstructured meshes
Published 2023“…The efficiencies of the GAMMA scheme and its variant have been augmented with a novel agglomeration multigrid scheme to accelerate the convergence to steady state using the multi-stage Runge-Kutta time-marching technique. …”
Article
