Search Results - (( _ optimization techniques algorithm ) OR ( java implementation level algorithm ))
Search alternatives:
- optimization techniques »
- implementation level »
- java implementation »
- level algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
4
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
5
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
6
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
8
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
9
An algorithm for the selection of planting lining technique towards optimizing land area: an algorithm for planting lining technique selection
Published 2012“…The three techniques with different planting lining direction lead to different number of trees, therefore the technique promotes the highest number of tree is optimal technique. …”
Get full text
Get full text
Conference or Workshop Item -
10
Optimizing optimal path trace back for Smith-Waterman algorithm using structural modelling technique
Published 2012“…The optimizing of optimal path trace back system for Smith-Waterman algorithm using structural modelling techniques are presented in this paper. …”
Get full text
Get full text
Student Project -
11
Artificial neural networks based optimization techniques: A review
Published 2023“…In the last few years, intensive research has been done to enhance artificial intelligence (AI) using optimization techniques. In this paper, we present an extensive review of artificial neural networks (ANNs) based optimization algorithm techniques with some of the famous optimization techniques, e.g., genetic algorithm (GA), particle swarm optimization (PSO), artificial bee colony (ABC), and backtracking search algorithm (BSA) and some modern developed techniques, e.g., the lightning search algorithm (LSA) and whale optimization algorithm (WOA), and many more. …”
Review -
12
Process Planning Optimization In Reconfigurable Manufacturing Systems
Published 2008“…Conventional optimization techniques are not robust, hence; they are not suitable for handling multidimensional search spaces. …”
Get full text
Get full text
Thesis -
13
A holistic review on artificial intelligence techniques for well placement optimization problem
Published 2020“…Newly developed optimization algorithms are very efficient and favorable when compared to other established optimization algorithms and in all cases, it has been noticed that hybridization of two or more algorithms works better than stand-alone algorithms. …”
Get full text
Get full text
Article -
14
Successor selection for Ant Colony Optimization technique algorithm / Muhammad Iskandar Isman
Published 2017“…ACO algorithm is the best solution because it included the optimization technique to optimized the result based on the data criteria needs. …”
Get full text
Get full text
Thesis -
15
Optimizing optimal path trace back system for Smith-Waterman algorithm using structural modelling technique: article
Published 2012“…back system for Smith-Waterman Algorithm using Structural Modelling Technique. The objectives for this paper are to optimize the best trace back scanning performance and also to design the simple architecture in order to reduce the runtime. …”
Get full text
Get full text
Article -
16
Comparative Investigation of Optimization Techniques for Photovoltaic Based Multilevel Inverter
Published 2016“…Optimization techniques can be applied to multilevel inverter with any number of levels; as an example in this project, a 9-level and 11 -level inverter is considered, This project summarizes two different optimization techniques, Genetic Algorithm (GA) and Firefly Algorithm (FFA) which will be used to find the optimal switching angle to eliminate the 5th, 7th and the 13th harmonics. …”
Get full text
Get full text
Final Year Project -
17
A comparative performance analysis of computational intelligence techniques to solve the asymmetric travelling salesman problem
Published 2021“…The comparative algorithms in this study employ different techniques in their search for solutions to ATSP: the African Buffalo Optimization employs the modified Karp–Steele mechanism, Model-Induced Max-Min Ant Colony Optimization (MIMM-ACO) employs the path construction with patching technique, Cooperative Genetic Ant System uses natural selection and ordering; Randomized Insertion Algorithm uses the random insertion approach, and the Improved Extremal Optimization uses the grid search strategy. …”
Get full text
Get full text
Get full text
Article -
18
A combinatorial optimization technique using genetic algorithm :a case study in machine layout problem
Published 2007“…Genetic Algorithms (GAs) are a powerful stochastic search in solving optimization problems. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
19
A meta-heuristics based input variable selection technique for hybrid electrical energy demand prediction models
Published 2017“…These models are developed by integrating multilayer perceptron neural network and evolutionary optimization techniques. Genetic algorithm and simulated annealing techniques are used to optimize the control parameters of the neural network. …”
Get full text
Get full text
Article -
20
Optimal neural network approach for estimating state of energy of lithium-ion battery using heuristic optimization techniques
Published 2023“…Backpropagation algorithms; Errors; Learning algorithms; Mean square error; Neural networks; Particle swarm optimization (PSO); Torsional stress; Back propagation neural networks; Backtracking search algorithms; Heuristic optimization technique; Optimal neural network; Optimization algorithms; Particle swarm optimization algorithm; Root mean square errors; state of energy; Lithium-ion batteries…”
Conference Paper
