Search Results - (( using mitigation method algorithm ) OR ( java application need algorithm ))
Search alternatives:
- mitigation method »
- using mitigation »
- method algorithm »
- java application »
- application need »
- need algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
A Hybrid K-Means Hierarchical Algorithm for Natural Disaster Mitigation Clustering
Published 2022“…Therefore, the proposed hybrid algorithm can provide relatively homogeneous clustering results in natural disaster mitigation.…”
Get full text
Get full text
Get full text
Get full text
Article -
4
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…Then the next step was to test the mitigation algorithm, the same above scenarios of attack were repeated and the entropy change after the mitigation was observed. …”
Get full text
Get full text
Thesis -
5
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
6
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
7
Network game (Literati) / Chung Mei Kuen
Published 2003“…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
8
-
9
-
10
Automated time series forecasting
Published 2011Get full text
Get full text
Get full text
Monograph -
11
Mitigation of harmonic current for balanced three-phase power system based on Extended Fryze Adaptive notch filter
Published 2023“…The algorithm's effectiveness in operation for the Shunt APF is validated through simulation using MATLAB/Simulink and experiment work by integrating the algorithm with DSPACE RS1104. …”
Get full text
Get full text
Get full text
Article -
12
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…This research was undertaken to develop methods to mitigate shoulder-surfing attack. Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method
Published 2020“…The first authentication method is the Luhn checksum algorithm, otherwise called Luhn formula or mod 10 algorithm. …”
Get full text
Get full text
Journal -
14
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
15
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
16
SIMULATION AND ANALYSIS OF HARMONIC DETECTION AND MITIGATION SYSTEM USING ACTIVE FILTER
Published 2019“…In addition, this objective of this paper is to study of method of harmonics mitigation using the designed active filter to obtain better quality of signal in power system. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
17
Optimized processing of satellite signal via evolutionary search algorithm
Published 2000“…A combination of three methods, namely optimization, global random search and ambiguity function mapping has produced an efficient and robust mitigation technique. …”
Get full text
Get full text
Article -
18
Text messaging encryption system
Published 2012Get full text
Get full text
Undergraduates Project Papers -
19
Nonlinear adaptive algorithm for active noise control with loudspeaker nonlinearity
Published 2014“…Passive method involves the use of enclosures, barriers and silencers but is ineffective at low frequency noise (below 500Hz). …”
Get full text
Get full text
Thesis -
20
Hybrid genetic algorithm for improving fault localization
Published 2018“…The result of the experiment shows that our technique able to detect multiple faults in various java programs but there is a need for improvement especially in prioritize fault that occurs simultaneously.…”
Get full text
Get full text
Get full text
Article
