Search Results - (( net generation method algorithm ) OR ( java application using algorithm ))
Search alternatives:
- generation method »
- method algorithm »
- java application »
- using algorithm »
- net generation »
-
1
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…In our research project we use to build a local website using the NetBeans Java averments and create our database management by using MySQL language. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
-
3
Development of least square adjustment application for traversing / Harith Fadhillah Soeb
Published 2019“…In addition, the development stage started by perform calculation process using MATLAB software. Next, the algorithm for calculation process was generated using the Eclipse application that uses Java programming language. …”
Get full text
Get full text
Thesis -
4
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
5
Generating a Malay sentiment lexicon based on wordnet
Published 2017“…The result shows the effectiveness of the proposed algorithm to generate Malay sentiment lexicon based on WordNet.…”
Get full text
Get full text
Get full text
Article -
6
-
7
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
8
-
9
Performance analysis of ant colony's algorithm: load-balancing in QoS-based wireless mesh networks routing
Published 2008“…The results show that, this new proposed method shows better operation in comparison to Ant-Net and other related methods. …”
Get full text
Get full text
Get full text
Article -
10
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
12
Problem-solving method with semantic net based on DNA computing in artificial intelligence
Published 2004“…Moreover, we propose a problem-solving method with DNA-typed Semantic Net. In this method, it is possible to reason out a reference object by using DNA computing algorithm. …”
Get full text
Get full text
Get full text
Book Section -
13
Comparative study of apriori-variant algorithms
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Optimization variation for multiple heuristic approaches in solar tracking
Published 2023Conference paper -
16
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Immune network algorithm in monthly streamflow prediction at Johor river
Published 2014“…This study proposes an alternative method in generating future stream flow data with single-point river stage. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
19
Comparative analysis of deepfake image detection method using VGG16, VGG19 and ResNet50
Published 2024“…Specifically, we focus on three convolutional neural network (CNN) algorithms—VGG16, VGG19, and ResNet—for this purpose. …”
Get full text
Get full text
Get full text
Article -
20
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item
