Search Results - (( probable distributed modified algorithm ) OR ( java application using algorithm ))
Search alternatives:
- probable distributed »
- distributed modified »
- java application »
- using algorithm »
-
1
Winsorize tree algorithm for handling outliers in classification problem
Published 2016“…This study proposes a modified classification tree algorithm called Winsorize tree based on the distribution of classes in the training dataset. …”
Get full text
Get full text
Get full text
Thesis -
2
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Additionally, the traffic are relying on the markers and scheduling algorithms to the service classes at the routers. The higher level priority agreements give a higher or equal probability than the lower level, this technique is perfect at a core router by scheduling algorithm. …”
Get full text
Get full text
Thesis -
3
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
4
-
5
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
6
Stochastic And Modified Sequent Peak Algorithm For Reservoir Planning Analysis Considering Performance Indices
Published 2016“…The tests are implemented for testing consistency, stationarity, randomness and determining the most appropriate probability distribution function of the historical data. …”
Get full text
Get full text
Thesis -
7
Parameter estimation of Kumaraswamy Burr type X models based on cure models with or without covariates
Published 2017“…Kumaraswamy distribution has a closed form of probability density function (PDF) and CDF, which makes it tractable. …”
Get full text
Get full text
Thesis -
8
An improvement on the valiantbrebner hypercube data broadcasting technique / Nasaruddin Zenon
Published 1990“…In section 1.0 a description of the hypercube topological characteristics will be given which can be used to modify the algorithm. Section 2.0 provides the description of the Valiant and Brebner (V-B) algorithm. …”
Get full text
Get full text
Article -
9
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
11
-
12
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
14
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
15
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
-
17
-
18
Route Optimization System
Published 2005“…The method used to develop this project is Rapid Application Development (RAD). …”
Get full text
Get full text
Final Year Project -
19
Application of Mellin-Kamal transformation in EL Gamal Ciphertext Cryptosystem / Nurul Syazwani Husairi and Nurul Aqilah Mohd Fauzi
Published 2023“…So, this study contributed to show a complete calculation and working to assist other future researchers know the complete step of the proposed scheme and reduce the probability of middle attackers and strengthen the existing algorithm with several cryptosystem integration. …”
Get full text
Get full text
Student Project -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…Diffie-Hellman algorithm is used to determine the pixel on an image that will be used to store the message. …”
Get full text
Get full text
Conference or Workshop Item
