Search Results - (( developing coupling efficient algorithm ) OR ( java implementation level algorithm ))
Search alternatives:
- implementation level »
- developing coupling »
- java implementation »
- coupling efficient »
- level algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Random traveling wave pulse coupled oscillator (RTWPCO) algorithm of energy-efficient wireless sensor networks
Published 2018“…To avert this problem, this study proposes a new mechanism called random traveling wave pulse-coupled oscillator algorithm, which is a self-organizing technique for energy-efficient wireless sensor networks using the phase-locking traveling wave pulse-coupled oscillator and random method on anti-phase of the pulse-coupled oscillator model. …”
Get full text
Get full text
Article -
4
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
5
Efficient Sequential and Parallel Routing Algorithms in Optical Multistage Interconnection Network
Published 2005“…The first approach is to develop an efficient sequential algorithm for the window method. …”
Get full text
Get full text
Thesis -
6
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
7
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
8
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
9
Application of response surface methodology coupled with genetic algorithm in the optimization of cutting conditions for surface roughness in end-milling of Inconel 718 using coate...
Published 2007“…This paper presents an efficient method of optimisation of surface roughness in end milling of Inconel 718 using TiAlN coated inserts under dry conditions by coupling response surface methodology (RSM) with genetic algorithm (GA). …”
Get full text
Get full text
Proceeding Paper -
10
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
11
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
12
Improvement of surface roughness in end milling of Ti6Al4V by coupling RSM with genetic algorithm
Published 2011“…The experimental results indicate that the proposed mathematical models suggested could adequately describe the performance indicators within the limits of the factors that are being investigated. The developed RSM is coupled as a fitness function with genetic algorithm to predict the optimum cutting conditions leading to the least surface roughness value. …”
Get full text
Get full text
Get full text
Article -
13
Optimization of robot plasma coating efficiency using genetic algorithm and neural networks / S.Prabhu and B.K.Vinayagam
Published 2017“…The developed mathematical model was further analyzed with Genetic algorithm to find out the optimum conditions leading to the maximum coating efficiency.…”
Get full text
Get full text
Get full text
Article -
14
Greedyzero-based scheduling algorithm to route in optical low stage interconnection networks
Published 2012“…This algorithm has been developed to achieve performance goals in terms of 50% reduction in the number of passes.…”
Get full text
Get full text
Thesis -
15
An efficient fault syndromes simulator for SRAM memories
Published 2009“…Due to this, a systematic approach for developing and evaluating memory test algorithm is required. …”
Get full text
Get full text
Get full text
Article -
16
A fault syndromes simulator for random access memories
Published 2008“…Due to this, a systematic approach for developing and evaluating memory test algorithm is required. …”
Get full text
Get full text
Article -
17
Maximum efficiency points of a proton-exchange membrane fuel cell system: Theory and experiments
Published 2025“…The results provide strong theoretical and experimental evidence for a unique maximum efficiency point for the fuel cell system and form a basis for developing maximum efficiency point tracking algorithms. ? …”
Article -
18
Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes
Published 2025“…The proposed method achieves a 75% enhancement in energy efficiency compared to conventional Orthogonal Multiple Access (OMA) and an 11% improvement over benchmark NOMA algorithms. …”
Get full text
Get full text
Get full text
Thesis -
19
Generalizations and Some Applications of Kronecker and Hadamard Products of Matrices
Published 2006“…The common vector exact solutions of these coupled are presented and, subsequently, construct a computationally - efficient solution of coupled matrix linear least-squares problems and nonhomogeneous coupled matrix differential equations. …”
Get full text
Get full text
Thesis -
20
A heuristic approach for finding similarity indexes of multivariate data sets
Published 2020“…However, classical techniques are sensitive to outliers and most of the non-classical approaches are either problem/application specific or overlay complex. Therefore, the development of an efficient and reliable algorithm for MDSs, with minimum time and space complexity, is highly encouraged by the research community. …”
Get full text
Get full text
Get full text
Article
