Search Results - (( variable reduction using algorithm ) OR ( java application service algorithm ))
Search alternatives:
- application service »
- variable reduction »
- service algorithm »
- java application »
- reduction using »
- using algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
3
Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm
Published 2007“…Then the algorithm gathers all the test cases based on the definition occurrence and def-use pair if they cover same definition occurrence of one variable but they don’t cover def-use pair of the same variable. …”
Get full text
Get full text
Thesis -
4
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
5
Strategies of Handling Different Variables Reduction for LDA
Published 2012“…The variables selection technique with local searching algorithm is manipulated. …”
Get full text
Get full text
Get full text
Article -
6
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Minimizing power loss using modified artificial bee colony algorithm / Nur Azlin Ashiqin Mohd Amin ...[et al.]
Published 2021“…These control variable values are adjusted for loss reduction. MABC algorithm is tested on the standard IEEE-30 bus test system. …”
Get full text
Get full text
Get full text
Article -
8
Enhanced scalar multiplication algorithm over prime field using elliptic net
Published 2024“…At the field operational level, in comparison to the binary method, the eight-block elliptic net method, and the elliptic net method with ten temporary variables for the 384 bits scenario, the developed scalar multiplication algorithm obtained cost reductions of 57.6%, 31.3%, and 13.2%, respectively. …”
Get full text
Get full text
Get full text
Article -
9
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
10
An empirical study of density and distribution functions for ant swarm optimized rough reducts
Published 2011“…Ant Swarm Optimization refers to the hybridization of Particle Swarm Optimization (PSO) and Ant Colony Optimization (ACO) algorithms to enhance optimization performance. It is used in rough reducts calculation for identifying optimally significant attributes set. …”
Get full text
Get full text
Get full text
Book Chapter -
11
A firefly algorithm based hybrid method for structural topology optimization
Published 2020“…The lower and upper limit of design variables (0 and 1) were used to find initial material distribution to initialize the firefly algorithm based section of the hybrid algorithm. …”
Get full text
Get full text
Article -
12
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
13
Variable step size least mean square optimization for motion artifact reduction: A review
Published 2019“…Therefore, we propose a research to formulate an improved motion artifact reduction approach using variable step-size least mean square (VSSLMS). …”
Get full text
Get full text
Article -
14
Enhancing Harmony Search Metaheuristic Algorithm for Coverage Efficiency, Test Suite Reduction, and Running Time in Combinatorial Interaction Testing
Published 2025“…The Harmony Search (HS) algorithm is a recent metaheuristic that mimics musicians’ improvisation to create pleasant compositions according to aesthetic standards widely used in different areas continuously adjusts solution variables to find the best outcome. …”
Get full text
Get full text
Article -
15
-
16
A Comparative Performance Analysis of Gaussian Distribution Functions in Ant Swarm Optimized Rough Reducts
Published 2011“…This paper proposed to generate solution for Particle Swarm Optimization (PSO) algorithms using Ant Colony Optimization approach, which will satisfy the Gaussian distributions to enhance PSO performance. …”
Get full text
Get full text
Article -
17
Development of a phantom and metal artifact correction (MAC) algorithm for post-operative spine computed tomography (CT) imaging / Noor Diyana Osman
Published 2014“…The last part is the development of a metal artifact correction (MAC) algorithm and evaluation of the proposed algorithm in artifacts reduction in CT images. …”
Get full text
Get full text
Thesis -
18
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…The experimental results showed that the accuracy of the algorithm over the NSL-KDD dataset was 99.72%, with a memory reduction of 10%. …”
Get full text
Get full text
Thesis -
19
A Comparative Analysis of Peak Load Shaving Strategies for Isolated Microgrid Using Actual Data
Published 2022“…The CVDTA algorithm deals with the hybrid photovoltaic (PV)â��battery energy storage system (BESS) to provide the peak shaving service where the capacity addition technique uses a peaking generator to minimize the peak demand. …”
Get full text
Get full text
Article -
20
