Search Results - (( problem implementation rendering algorithms ) OR ( java application customization algorithm ))
Search alternatives:
- implementation rendering »
- customization algorithm »
- problem implementation »
- rendering algorithms »
- java application »
-
1
The Construction Of Quantum Block Cipher For Grover Algorithm
Published 2018“…Asymmetric cryptographic algorithms which are based on integer factorization or discrete logarithms problems are rendered unsecured against quantum attacks. …”
Get full text
Get full text
Thesis -
2
Panoramic image matching method for UAV remote sensing based of sift algorithm
Published 2024text::Final Year Project -
3
Multiperiod secure economic dispatch for large-scale power systems
Published 1989“…The computational efficiency of the algorithm renders it suitable for on-line dispatch.…”
Get full text
Get full text
Article -
4
Dynamic Secure Economic Dispatch For Large Scale Power System
Published 1989“…The computational efficiency of the algorithm renders it suitable for on-line dispatch.…”
Get full text
Get full text
Article -
5
An efficient real-time terrain data organization and visualization algorithm based on enhanced triangle-based level of detail technique
Published 2006“…The purpose of this research is to design, develop and implement an algorithm for enhancing the rendering efficiency of triangle-based LOD technique. …”
Get full text
Get full text
Thesis -
6
Binary ant colony optimization algorithm in learning random satisfiability logic for discrete hopfield neural network
Published 2024“…This study introduced a novel ant colony optimization algorithm that implements the population selection strategy of the Estimation of Distribution Algorithm and a new pheromone updating formula. …”
Get full text
Get full text
Get full text
Article -
7
E-Raser: file shredder application with content replacement by using random words function
Published 2018“…The implemented algorithm replaced the original content of the files with uninformative words provided by the application. …”
Get full text
Get full text
Get full text
Article -
8
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
9
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…AI algorithms rely on data or information to learn, analyze, and reach conclusions. …”
Get full text
Get full text
Get full text
Article -
10
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…AI algorithms rely on data or information to learn, analyze, and reach conclusions. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
11
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Handover Management for Drones in Future Mobile Networks—a Survey
Published 2024journal::journal article -
13
Robust Data Fusion Techniques Integrated Machine Learning Models For Estimating Reference Evapotranspiration
Published 2022“…The size of the dataset overwhelmed the problem’s dimensionality, thus rendering the bootstrap aggregating to be ineffective. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
