Search Results - (( variable affecting evolution algorithm ) OR ( java application matching algorithm ))
Search alternatives:
- application matching »
- affecting evolution »
- evolution algorithm »
- variable affecting »
- java application »
-
1
-
2
-
3
-
4
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
5
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
-
7
SWAT and ANN model hydrological assessment using Malaysia soil data / Khairi Khalid
Published 2017“…The adoption of a strategic approach is needed for planning and managing that flood management in any watershed. The evolution of distributed watershed models has been established for more accurate representation of the hydrological system by considering the spatial variability of model parameters and inputs. …”
Get full text
Get full text
Book Section -
8
Shear strength test on unsaturated soil using natural microscopic surface tension force / Basharudin Abdul Hadi
Published 2017“…There were two sets of algorithms in developing the UPLRB ANN model and every algorithm set consisted of model inputs data preparation, neural network 29 30 base of the specimen until the flow ceased..…”
Get full text
Get full text
Book Section -
9
SWAT and ANN model hydrological assessment using Malaysia soil data / Khairi Khalid
Published 2017“…There were two sets of algorithms in developing the UPLRB ANN model and every algorithm set consisted of model inputs data preparation, neural network script and neural network error checking measures. …”
Get full text
Get full text
Thesis -
10
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis
