Search Results - (( developing developing measures algorithm ) OR ( java implementation level algorithm ))
Search alternatives:
- developing developing »
- implementation level »
- java implementation »
- measures algorithm »
- level algorithm »
-
1
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
3
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
4
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
5
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
6
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
8
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
9
The Development of an Algorithm to Determine Axial Capacity of Piles from SPT N-Values
Published 2000“…The developed IT was used for all cases of algorithm testing. …”
Get full text
Get full text
Thesis -
10
A real-time algorithm of optical tactile sensor for surface characterization / Nurul Fathiah Mohamed Rosli
Published 2016“…A surface exploration computer algorithm to obtain the sensing information was developed in order to analyse the characteristic of the optical tactile sensor. …”
Get full text
Get full text
Thesis -
11
-
12
-
13
DEVELOPMENT OF AN OPTICAL STRAIN MEASUREMENT METHOD
Published 2011“…In conclusion, the two-dimensional deformation measurement algorithm had been successfully developed.…”
Get full text
Get full text
Thesis -
14
A web-based implementation of k-means algorithms
Published 2022“…k-luster, the web application developed as a result of this project, implements the K-means and K-means++ algorithm along with ten proximity measures, seven of which are distance measures and whereas the remaining three are similarity measures. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Design and development of cooperative simultaneous localization and mapping integrated with neural network for mobile robot
Published 2024“…Secondly, a framework of CSLAM algorithm integrated with ANN using Rao-Blackwellized particle filter (RBPF) algorithm for single SLAM robot, and the map merging using random sample consensus (RANSAC) algorithm, is designed and developed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Algorithm analyzer to check the efficiency of codes
Published 2011“…Efficiency of codes developed is always an issue in software development. …”
Get full text
Get full text
Conference or Workshop Item -
17
A Knowledge Management System for Assessing Lecturer Competence in Indonesian Higher Educational Institutions
Published 2025“…This means that the accuracy of the developed system in measuring lecturer competency is 91.8%.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
The Development of Synthetic Algorithm of Fluid Flow Through Particle Image Velocimetry (PIV)
Published 2017“…This report discusses the interrogation performance of a cross-correlation based PIV algorithm with interrogation flexibility. In order to assess the developed algorithm, this procedure is tested with synthetic data for uniform linear flow under various experimental conditions. …”
Get full text
Get full text
Final Year Project -
19
Effort Estimation Model for Function Point Measurement
Published 2007“…This research work has generated an algorithmic effort estimation model for function points measurement. …”
Get full text
Get full text
Thesis -
20
Development of bacteria foraging optimization algorithm for cell formation in cellular manufacturing system considering cell load variations
Published 2013“…This paper investigates the first applications of this emerging novel optimization algorithm to the cell formation (CF) problem. In addition, for this purpose matrix-based bacteria foraging optimization algorithm traced constraints handling (MBATCH) is developed. …”
Get full text
Get full text
Article
