Search Results - (( java implication tree algorithm ) OR ( software implementation some algorithm ))
Search alternatives:
- software implementation »
- implementation some »
- java implication »
- implication tree »
- tree algorithm »
- some algorithm »
-
1
Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation
Published 2000“…For the implementation aspect, software-driven media processing was studied. …”
Get full text
Get full text
Thesis -
2
-
3
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
4
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
5
-
6
High performance visualization of human tumor growth software
Published 2008“…This paper focuses on the implementation of parallel algorithm for the simulation of hyperbolic equation for breast pressure and parabolic equation of brain tumors growth. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. …”
Get full text
Get full text
Proceeding Paper -
8
-
9
A novel N-input voting algorithm for X-by-wire fault-tolerant systems
Published 2014“…Depending on the characteristics of the application and the type of selected voter, the voting algorithms can be implemented for either hardware or software systems. …”
Get full text
Get full text
Get full text
Article -
10
RISC-V instruction set extension on blockchain application
Published 2024“…Although there were numerous ways to improve the performance speed of blockchain technology in software implementations, hardware implementation of the blockchain algorithms was a more preferred choice due to the emerging open-source computer architecture, RISC-V. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
VITILIGO LESION ASSESSMENT TOOL ON SMARTPHONE
Published 2013“…ICA algorithm does vast computations thus; ICA algorithm is used to improve segmentation performance. …”
Get full text
Get full text
Final Year Project -
12
-
13
Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms
Published 2014“…Experiments were conducted using k-means, k-medoids and EM-algorithm. The study implements each algorithm using RapidMiner Software and the results generated was validated for correctness in accordance to the concept of external criteria method. …”
Get full text
Get full text
Get full text
Article -
14
Rapid software framework for the implementation of machine learning classification models
Published 2021“…This paper provides an insight of a rapid software framework for implementing machine learning. …”
Get full text
Get full text
Article -
15
Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm
Published 2014“…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE) as software and a Bluetooth (BT) Shield connected to an Arduino Uno R3 boards as hardware. …”
Get full text
Get full text
Get full text
Proceeding Paper -
16
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
17
Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri
Published 2021“…Unfortunately, this software has many weaknesses, lack some features and most importantly, it does not provide geoid model specialized for Malaysia. …”
Get full text
Get full text
Thesis -
18
Multi-Backpropagation network
Published 2002“…The learning mechanism for Neural Network is its learning algorithm. Backpropagation (or backprop) algorithm is one of the well-known algorithms in neural networks. …”
Get full text
Get full text
Conference or Workshop Item -
19
Sequence and sequence-less t-way test suite generation strategy based on the elitist flower pollination algorithm
Published 2018“…In fact, the design of eFPA adds new value into the domain software testing as it is the first t-way strategy that adopts elitism-FPA as its core implementation.…”
Get full text
Get full text
Thesis -
20
Security analysis of blowfish algorithm
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item
