Search Results - (( based evaluation modified algorithm ) OR ( java implementation _ algorithm ))
Search alternatives:
- evaluation modified »
- java implementation »
- based evaluation »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
3
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
4
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
5
Development of high quality speech compression system for Quranic recitation based on modified CELP algorithm
Published 2013“…Next, we optimize CELP algorithm based on previous findings by modifying the original stochastic codebook. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
7
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The second agent is a reliability evaluation agent that uses a recursive algorithm to predict the suitability generator based on the frequency and duration reliability indices in each state while the third agent is the storage and transfer of data between the other two agents. …”
Get full text
Get full text
Thesis -
8
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
9
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
10
Evaluation of structured questions using modified BLEU algorithm
Published 2016“…This paper describes and exemplifies an application of a Structured Exam Questions Test Bank and Evaluation Using Modified Bilingual Evaluation Understudy (BLEU) Algorithm, a software system developed in pursuit of robust computerized marking of free-text answers to open-ended questions.It employs the Information System Development Research Methodology with modified BLEU Algorithm and Expert System for similar words.The system was developed to facilitate in managing and administrating structured questions for client/server architecture based on intranet. …”
Get full text
Get full text
Get full text
Article -
11
Modified word representation vector based scalar weight for contextual text classification
Published 2024“…To validate this algorithm, the modified word vectors are compared with original LLM-generated word vectors to evaluate their reflection of the intended context. …”
Get full text
Get full text
Thesis -
12
Performance evaluation of Modified Widrow-Hoff ADALINE under effect of photovoltaic with shunt active power filter
Published 2016“…From the simulation results, the Modified Widrow-Hoff algorithm shows good performances for PV based SAPF with low THD values, fast response times and reduced source power from the grid under various levels of irradiance.…”
Get full text
Get full text
Conference or Workshop Item -
13
Modified Contrast Limited Adaptive Histogram Equalization for high dynamic range images
Published 2012“…The algorithm was written by using MATLAB software. The local tone mapping method is based on the modified contrast limited adaptive histogram equalization (CLAHE) method. …”
Get full text
Get full text
Thesis -
14
Fuzzy clustering method and evaluation based on multi criteria decision making technique
Published 2018“…This proposed algorithm is developed based on heuristic method named modified binary particle swarm optimization (MBPSO) with kernel fuzzy clustering method as a fitness function. …”
Get full text
Get full text
Get full text
Thesis -
15
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
16
A New Proposed Design Of A Stream Cipher Algorithm: Modified Grain-128
Published 2024“…The objective of this research is to propose a new algorithm based on the existing Grain - 128 stream cipher algorithm. …”
Article -
17
Modified Opposition Based Learning to Improve Harmony Search Variants Exploration
Published 2020“…Thus, inspired by a new opposition-based learning variant named modified opposition-based learning (MOBL), this research employed the MOBL to improve five well-known variants of HS. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
A modified fuzzy min-max neural network with a genetic-algorithm-based rule extractor for pattern classification
Published 2010“…The first stage consists of a modified fuzzy min-max (FMM) neural-network-based pattern classifier, while the second stage consists of a genetic-algorithm (GA)-based rule extractor. …”
Get full text
Article -
19
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
20
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project
