Search Results - (( variable generation ((y algorithm) OR (_ algorithm)) ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…Results: Attack on the key generation process was prevented because of random key generation and its dependency to input message. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4
  5. 5

    Prediction of hydropower generation via machine learning algorithms at three Gorges Dam, China by Sattar Hanoon M., Najah Ahmed A., Razzaq A., Oudah A.Y., Alkhayyat A., Feng Huang Y., kumar P., El-Shafie A.

    Published 2024
    “…Three different scenarios are examined, such as scenario1 (SC1): used to predict daily power generation, scenario 2 (SC2): used to predict power generation for monthly prediction and scenario 3 (SC3): used to predict hydropower generation (HPG) seasonally. …”
    Article
  6. 6
  7. 7

    Seismic wave modeling and high-resolution imaging by Bashir, Y., Ghosh, D.P., Alashloo, S.Y.M.

    Published 2022
    “…Using input seismic variables such as velocity, frequency, depth, and migration aperture, an algorithm is developed to observe the behavior of diffraction hyperbolas. …”
    Get full text
    Get full text
    Book
  8. 8

    A Clustering Algorithm for Evolving Data Streams Using Temporal Spatial Hyper Cube by Al?amri R., Murugesan R.K., Almutairi M., Munir K., Alkawsi G., Baashar Y.

    Published 2023
    “…To fill this gap, an online clustering algorithm for handling evolving data streams using a tempo?…”
    Article
  9. 9

    Predicting sanitary landfill leachate generation in humid regions using ANFIS modeling by Abunama, Taher, Othman, Faridah, Younes, Mohammad K.

    Published 2018
    “…Leachate generation is related to several variable factors, including meteorological data, waste generation rates, and landfill design conditions. …”
    Get full text
    Get full text
    Article
  10. 10

    A proactive fuzzy-guided link labeling algorithm based on MIH framework in heterogeneous wireless networks by Salih Y.K., See O.H., Yussof S., Iqbal A., Mohammad Salih S.Q.

    Published 2023
    “…It can provide the information about the parameters that affect on the events generation. An efficient system that generates links trigger mechanism will extensively impact the handover performance. …”
    Article
  11. 11
  12. 12

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  13. 13
  14. 14
  15. 15

    Zero distortion-based steganography for handwritten signature by Iranmanesh, Vahab

    Published 2018
    “…In this thesis, the human handwritten signature is introduced as a novel cover media (c) in conjunction with a steganography algorithm since there is a level of variability (i.e intra-user variability) within handwritten signature samples of an individual. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20