Search Results - (( using factor ((needs algorithm) OR (_ algorithm)) ) OR ( java application tools algorithm ))
Search alternatives:
- application tools »
- java application »
- needs algorithm »
- tools algorithm »
- using factor »
-
1
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
2
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Secondly, an expert system using Java programming technology with two tiers of search engine was developed to perform a fast selection of candidate materials in huge volume. …”
Get full text
Get full text
Thesis -
3
An Information Retrieval Algorithm to Extract Influential Factors
Published 2012“…The aim of the study is to develop an algorithm that can extract a minimum set of factors that can be used to assess companies’ performances. …”
Get full text
Get full text
Get full text
Thesis -
4
-
5
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
6
Optimization Of Pid Controller Using Grey Wolf Optimzer And Dragonfly Algorithm
Published 2018“…However, to fully utilize the algorithm, the parameter of the algorithm need to be set properly. …”
Get full text
Get full text
Monograph -
7
Robotic indoor path planning using dijkstra's algorithm with multi-layer dictionaries
Published 2016“…The algorithm needs to optimise other factors such as energy consumption and the degree of turns a robot need to take. …”
Get full text
Get full text
Conference or Workshop Item -
8
Healthy Lifestyle Management System
Published 2011“…The intelligent algorithm that used in this application is Rule-Based algorithm. …”
Get full text
Get full text
Final Year Project -
9
Investigation of relaxation factor in landweber iterative algorithm for electrical capacitance tomography
Published 2020“…It is crucial to select a suitable relaxation factor in iterative image reconstruction algorithms (e.g. …”
Get full text
Get full text
Article -
10
Impatient task mapping in elastic cloud using genetic algorithm
Published 2011“…Cloudsim simulator was used to test the proposed algorithm with real datasets collected as a cloud benchmark. …”
Get full text
Get full text
Get full text
Article -
11
What drives Chinese youth to use fitness-related health information on social media? an analysis of intrinsic needs, social media algorithms, and source credibility
Published 2024“…This study aims to address this gap by integrating Self-Determination Theory (SDT)-based internal factors and external factors (social media algorithms and source credibility). …”
Get full text
Get full text
Get full text
Article -
12
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…All the three proposed algorithms are evaluated using discrete event simulation, in particular Network Simulator tool (NS2), and compared with the latest routing algorithm (NCPR ) and fundamental algorithm (AODV) using five performance metrics. …”
Get full text
Get full text
Get full text
Thesis -
13
A review of machine vision pose measurement
Published 2024“…Describes the commonly used algorithms for machine vision pose measurement. …”
Get full text
Get full text
Get full text
Article -
14
A review of machine vision pose measurement
Published 2024“…Describes the commonly used algorithms for machine vision pose measurement. …”
Get full text
Get full text
Get full text
Article -
15
A novel enhancement technique of the hill cipher for effective cryptographic purposes.
Published 2011“…Results: A comparative study has been made between the proposed algorithm and the existing algorithms. The encryption quality of the proposed algorithm is also measured by using the maximum deviation factor and correlation coefficient factor. …”
Get full text
Get full text
Get full text
Article -
16
Range sensor based local path planning algorithm for mobile robot in unknown static environment with beacon / Wan Ahmad Jailani Wan Ngah
Published 2013“…During circumnavigating an obstacle, Bug algorithm needs to detect a situation that triggers to leave the current circumnavigating obstacle toward target point. …”
Get full text
Get full text
Thesis -
17
Determination of dengue hemorrhagic fever disease factors using neural network and genetic algorithms / Yuliant Sibaroni, Sri Suryani Prasetiyowati and Iqbal Bahari Sudrajat
Published 2020“…In this study, the problem of determination dengue disease factors was modeled using a neural network. The activation function in this neural network model then estimated using genetic algorithms. …”
Get full text
Get full text
Get full text
Article -
18
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
19
Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal
Published 2022“…In addition, objective function using the same CSSA algorithm were applied i.e., Vmin and Ploss as the objective function, and multi-objective involves Vmin and Ploss as the objective function. …”
Get full text
Get full text
Thesis -
20
Parallel Processing of RSAAlgorithm Using MPI Library
Published 2006“…This report explains the project of developing Parallel Processing of RSA Algorithm Using MPI Library. RSA Algorithm is a public-key cryptosystem that offers encryption technique which security is based on the difficulty of factoring large prime integers. …”
Get full text
Get full text
Final Year Project
