Search Results - (( java application service algorithm ) OR ( parallel validation study algorithm ))
Search alternatives:
- application service »
- service algorithm »
- java application »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
3
Parallel block backward differentiation formulas for solving large systems of ordinary differential equations.
Published 2010“…In this paper, parallelism in the solution of Ordinary Differential Equations (ODEs) to increase the computational speed is studied. …”
Get full text
Get full text
Article -
4
The Parallel Fuzzy C-Median Clustering Algorithm Using Spark for the Big Data
Published 2024“…The experimental results show that c=5, which is consistent for cost function with the ideal silhouette coefficient of 1, is the optimal number of clusters for this dataset. A comparative study is done to validate the proposed algorithm by implementing the other contemporary algorithms for the same dataset. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
6
Flexible job shop scheduling using priority heuristics and genetic algorithm
Published 2010“…Then, the validation of proposed genetic algorithm with reinforced initial population (GA2) has been checked with random keys genetic algorithm (RKGA). …”
Get full text
Get full text
Thesis -
7
Distributed generation system using parallel inverters supplied by unstable DC source
Published 2009“…This study presents the analysis and design of distributed generation system. …”
Get full text
Get full text
Article -
8
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
10
Online system identification development based on recursive weighted least square neural networks of nonlinear hammerstein and wiener models.
Published 2022“…Best Hammerstein parallel NN polynomial based model and series-parallel NN polynomial model are 88.75% and 93.9% respectively, for best Hammerstein parallel NN sigmoid based model and series-parallel NN sigmoid based model 78.26% and 95.95% respectively, and for best Hammerstein parallel NN hyperbolic tangent based model and series-parallel NN hyperbolic tangent based model 70.7% and 96.4% respectively. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
A hybrid bat–swarm algorithm for optimizing dam and reservoir operation
Published 2019“…In addition, different optimization algorithms from previous studies are investigated to compare the performance of the proposed algorithm with existing algorithms for the same case study. …”
Get full text
Get full text
Article -
12
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
13
-
14
-
15
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
16
Efficient Numerical Modelling of Extreme Wave
Published 2020“…Future works will be carried out to study the parallelization of the algorithm to allow for larger problem size to be treated.…”
Get full text
Get full text
Final Year Project -
17
Efficient Numerical Modelling of Extreme Waves
Published 2020“…Future works will be carried out to study the parallelization of the algorithm to allow for larger problem size to be treated.…”
Get full text
Get full text
Final Year Project -
18
Evaluation of outlier filtering algorithms for accurate measurement of travel time reliability incorporating lane-splitting situations / Obada M. A. Asqool
Published 2022“…In order to find the best filtration algorithm, two stages were adopted in this study. The first stage was the validation of the performance of the previous algorithms. …”
Get full text
Get full text
Get full text
Thesis -
19
Identifying The Ethical Issues In Twitter: A Knowledge Acquisition For Ontology
Published 2024“…Having done the validation process on these sentiments, the study proposed these identified ethical issues from tweets as a domain in developing ontology relationships with Ibn Khaldun’s thoughts. …”
Article -
20
Development of a multi-objective optimization model for transport and environment in a closed-loop automotive supply chain
Published 2014“…Finally to present the model validity of a real case study in automotive industrial was studied. …”
Get full text
Get full text
Thesis
