Search Results - (( making causing problems algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- application matching »
- causing problems »
- java application »
- making causing »
-
1
Message based random variable length key encryption algorithm.
Published 2009“…Long and variable key length made key exhaustive search and differential attack impossible. None fixed size key caused avoidance of replaying and other attacks that can happen on fixed sized key algorithms. …”
Get full text
Get full text
Article -
2
-
3
Tolerable Constructive Graph-Based Hyper-Heuristic Algorithm For Examination Timetabling
Published 2009“…The main cause for the local optimal problem is that heuristic algorithms either focus on exploration (global improvement) rather than exploitation (local improvement) or vice versa.…”
Get full text
Get full text
Thesis -
4
-
5
-
6
-
7
Design of a flexible digital baseband signal processing algorithm
Published 2006“…In this paper, we show how we solved the problem by satisfying several requirements simultaneously: 1) removing loop or complicated algorithm in DBSP functions with flexible DBSP algorithm 2) using DSP-BIOS Scheduling module to increase performance and make sure our sample data are in packed. …”
Get full text
Get full text
Conference or Workshop Item -
8
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Predicting future sales using genetic algorithm: data mining sales / Siti Hajar Yaacob
Published 2014“…This problem can cause the imbalance in sales. Based on the problem statement, Genetic Algorithm was applied to test whether it is compatible to predict the future sales. …”
Get full text
Get full text
Thesis -
10
Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni
Published 2013“…Man in The Middle Attack (MiTM) can manipulate and give false information to the sender. This problem can cause a big impact to the businessman when they do trading transaction. …”
Get full text
Get full text
Thesis -
11
Ant colony optimization (ACO) algorithm for CNC route problem
Published 2012“…However, the CNC machines do not choose the optimal route when completing their task and this caused the high cost problem on the machining. This project proposes a new optimization technique which applies ant behavior, for finding the optimal route in PCB holes drilling process. …”
Get full text
Get full text
Undergraduates Project Papers -
12
A multiple mitosis genetic algorithm
Published 2023“…Having great advantages on solving optimization problem makes this method popular among researchers to improve the performance of simple Genetic Algorithm and apply it in many areas. …”
Article -
13
A backward recovery mechanism in preemptive utility accrual real time scheduling algorithm
Published 2010“…Problem statement: This study proposed a robust algorithm named as Backward Recovery Preemptive Utility Accrual Scheduling (BRPUAS) algorithm that implements the Backward Recovery(BR) mechanism as a fault recovery solution under the existing utility accrual scheduling environment. …”
Get full text
Get full text
Article -
14
A multi-layer dimension reduction algorithm for text mining of news in forex / Arman Khadjeh Nassirtoussi
Published 2015“…Therefore, this work produces a multi-layer dimension reduction algorithm to respond to this need. The algorithm tackles a different root cause of the problem at each layer. …”
Get full text
Get full text
Thesis -
15
Design and Implementation of PID Controller for the Cooling Tower?s pH Regulation Based on Particle Swarm Optimization PSO Algorithm
Published 2025“…The deviation in PH parameter affects the pipes, such as corrosion and scale. Acidic water causes pipes to corrode, and alkaline water causes pipes to scale. …”
Article -
16
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…But the major treat of the IPSec is caused by the usage or the algorithm that has weak keys. …”
Get full text
Get full text
Conference or Workshop Item -
17
Shortest path from Bandar Tun Razak to Berjaya Times Square using Dijkstra Algorithm / Nur Syuhada Muhammat Pazil ... [et al.]
Published 2020“…The time wasted on the road causes a lot of problems to the users. Furthermore, the costs between two destinations are rather expensive. …”
Get full text
Get full text
Get full text
Article -
18
-
19
-
20
Segmentation of Magnetic Resonance Brain Images Using Watershed Algorithm
Published 2004“…It is also proven that the placement of internal and external markers into regions of interest (i.e. making the system interactive) can easily cope with the over-segmentation problem of the watershed.…”
Get full text
Get full text
Thesis
