Search Results - (( java implication tree algorithm ) OR ( from implementation method algorithm ))

Refine Results
  1. 1

    Implementation of hybrid encryption method using caesar cipher algorithm by Tat Wi, Charomie

    Published 2010
    “…As a conclusion, Caesar cipher algorithm can be implemented in hybrid encryption project to make data secure and better.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Implementation of hybrid encryption method using caesar cipher algorithm by Charomie, Tat Wi

    Published 2010
    “…This method is names after Julius Caesar who using this method to communicate with his generals.The result from this project is a data which is encrypted and be decrypted to its readable form.As a conclusion,Caesar cipher algorithm can be implemented in hybrid encryption project to make data secure and better.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3
  4. 4

    Evaluation of the effectiveness and efficiency of Wagner and Fischer algorithm in retrieving Hadith translated documents / Kamarul Arifin Muhamad by Muhamad, Kamarul Arifin

    Published 2002
    “…The result is the produced result from experiment. The method has been implemented as a C programming language. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Festive season balancing groceries optimization / Fairuz Mohamed Razi by Mohamed Razi, Fairuz

    Published 2012
    “…The cause of the shortage in supply-demand is taken to be implemented in the Genetic Algorithms optimization concepts. …”
    Get full text
    Get full text
    Thesis
  7. 7

    An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf by Yusuf, Yusmardiah

    Published 2017
    “…Since the implementation of scheduling algorithm is an open issue in LTE, many packet scheduling algorithms have been proposed by researchers. …”
    Get full text
    Get full text
    Thesis
  8. 8

    IMPLEMENTATION OF IMAGE TEXTURE ANALYSIS USING GRAY LEVEL RUN LENGTH APPROACH by MOHD YAKOP, SITI HAJAR

    Published 2006
    “…The objective of this project is to develop algorithms inMATLAB and be able to implement image texture analysis by using the developed algorithms. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof by Yusof, Yusman

    Published 2019
    “…In the algorithm development a step-by-step example of the algorithm implementation is presented and then successfully implemented in Lego Mindstorm obstacle avoiding mobile robot as a proof of concept implementation of the hybrid AI algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    The normalized random map of gradient for generating multifocus image fusion by Ismail, ., Kamarul Hawari, Ghazali

    Published 2020
    “…There are many methods to generate fused image from several images so far. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Real time nonlinear filtered-x lms algorithm for active noise control by Sahib, Mouayad Abdulredha

    Published 2012
    “…However, unlike the other algorithms, NLFXLMS cannot be implemented in real time. …”
    Get full text
    Get full text
    Thesis
  12. 12

    DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE by FLORISCA, ALDINA GODULUS

    Published 2019
    “…This project used iterative method to investigate the security algorithm and implemented the algorithm. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  13. 13
  14. 14

    Network reconfiguration and control for loss reduction using genetic algorithm by Jawad, Mohamed Hassan Izzaldeen

    Published 2010
    “…Tests have shown that the differences are demonstrated only in execution time to arrive the best fitness function of the Genetic Algorithm. Whereas the results obtained from both selection methods are similar to each other. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari by Mohammad Zahari, Mohamad Zakirin

    Published 2014
    “…On this paper, the research will focus on the AES encryption and decryption computational process of the text in the Android platform. AES algorithm been chosen because it is one of the most secured cryptography methods, very flexible, and most commonly implemented. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An improved bees algorithm local search mechanism for numerical dataset by Al-Dawoodi, Aras Ghazi Mohammed

    Published 2015
    “…Furthermore, in this study the feature selection algorithm is implemented and tested using most popular dataset from Machine Learning Repository (UCI). …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Implementation of High Speed Large Integer Multiplication Algorithm on Contemporary Architecture by Chang, Boon Chiao

    Published 2018
    “…We are able to eliminate the bottleneck, the CRT algorithm from our previous implementation by replacing it with another level of CTFNT and hence increased the multiplication operand size to 4096, 192K, 384K and 768K-bit.In our FPGA implementation, we focused on designing the processing unit ourselves that is capable of computing 3072-bit multiplication. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    A firefly algorithm based hybrid method for structural topology optimization by Gebremedhen, H.S., Woldemichael, D.E., Hashim, F.M.

    Published 2020
    “…Since the direct application of the firefly algorithm cannot generate connected topologies, outputs from the firefly algorithm were used as an initial input material distribution for the OC method. …”
    Get full text
    Get full text
    Article
  19. 19

    Implementation of Color Filtering on FPGA by Mohd Shukor, Mohd Nasir, Lo, H. H., Sebastian, Patrick

    Published 2007
    “…The second is the double band-pass-filter algorithm. Work is currently conducted to quantify the effectiveness of the band-pass filtering algorithm on FPGA before proceeding to test and implement the triple and quadruple band-pass filtering methods.…”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Amplitude independent muscle activity detection algorithm of soft robotic glove system for hemiparesis stroke patients using single sEMG channel by Hameed, Husamuldeen Khalid

    Published 2020
    “…The algorithm employs the First Lag Autocorrelation and the Modified Sample Entropy methods to detect and classify weak hand closing and opening muscle activities by using signal obtained from the Flexor Carpi Ulnaris forearm muscle. …”
    Get full text
    Get full text
    Thesis