Search Results - (( developing dynamic conversion algorithm ) OR ( java implementation level algorithm ))
Search alternatives:
- conversion algorithm »
- implementation level »
- java implementation »
- developing dynamic »
- level algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
4
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
5
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
6
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
8
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
9
Protovoltaic boost DC/DC converter with adaptive perturb and observe-fuzzy maximum power point tracking algorithm
Published 2013“…For comparison purpose,conventional perturb and observe, and fuzzy logic control algorithms were modelled too. In hardware development, the prototype was developed and tested to verify simulation work. …”
Get full text
Get full text
Thesis -
10
Multi-sources model and control algorithm of an energy management system
Published 2012Get full text
Get full text
Article -
11
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
12
Fuzzy based BSA optimization for maximum power point tracking controller performance evaluation
Published 2023Conference Paper -
13
Secure E-Voting With Blind Signature
Published 2003“…In this system, voter’s privacy is guaranteed by using a blind signature for confidentiality and voter’s digital signature for voter’s authentication. E-Voting is implemented by employing Java socket technology and BouncyCastle cryptography provider. …”
Get full text
Get full text
Conference or Workshop Item -
14
Variable Speed Control Of Two-Mass Wind Turbine System Via State Feedback With Adaptation Law
Published 2018“…Wind turbine convert kinetic energy from the wind to rotational energy and then to electrical energy.In a wind energy conversion system (WECS),its electrical power control (EPC) side demanded a maximum mechanical power from the mechanical power control (MPC) side despite any intermittent wind and seasonal interference.Therefore,it is necessary to develop a variable speed algorithm for a modern WECS.For a two-mass horizontal axis wind turbine, the rotor and generator stiffness is commonly being neglected in the system dynamic.The inclusion of stiffness in system dynamic introduces integral term in the system expression and hence,incur mathematical complexity in the controller design phase.Contrary,this study consider stiffness as unknown parameter in the wind turbine dynamic.In order to obtain the maximum output power,the design of an algorithm with adaptation law for the speed control of a two-mass wind turbine system with an unknown stiffness is proposed in this research.The algorithm is formulated using a full-state feedback.In pursuance of solving the tracking control as a regulation case,the speed of the turbine is bijective mapped into the error dynamic.The stability of the proposed algorithm is guaranteed by Lyapunov.The adaptation law used in the variable speed algorithm is to successfully acquire the adaptability of the algorithm towards an unknown stiffness.Therein,the estimated stiffness is augmented in the Lyapunov function.The Lie derivative of the function is made into a negative semi-definite via the non-negative control parameters.In order to control the rotor speed to sustain the optimum tip-speed ratio (TSR),as well as obtaining the maximum power output from the turbine,the proposed algorithm is constructed.A MATLAB with Simulink® toolbox is used to validate the effectiveness of the proposed control speed.The simulation result showed that the rotor speed achieved an asymptotic tracking towards the demanded rotor speed irrespective of the stiffness value.The error is proved to be minimized as the integral of absolute error (IAE) obtained for wind turbine with stiffness ranging from 134550 Nmrad-1,269100 Nmrad-1,and 403650 Nmrad-1 are recorded as 0.003088,0.003063 and 0.003088 respectively. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
-
16
ANFIS based neuro-fuzzy control of dfig for wind power generation in standalone mode
Published 2023Conference Paper -
17
Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter
Published 2013“…Then, the proposed MPPT algorithm and dc-dc boost converter were designed and developed in the same tool. …”
Get full text
Get full text
Thesis -
18
Network monopoly / Tan Kean Yeap
Published 2002“…The main aspect of this thesis is to produce a network monopoly system, which process multiple game sessions concurrently, enabling users to play the graphical game with people within the network. The algorithm design and implementation method mustnot only be workable, but also highly efficient in terms of execution speed and respond time. …”
Get full text
Get full text
Thesis -
19
Combination of perturb and observe with online sequential extreme learning machine for photovoltaic system maximum power point tracking
Published 2018“…From different MPPT techniques previously proposed, the online sequential extreme learning machine algorithm and conventional perturb and observe are combined together as a proposed MPPT algorithm. …”
Get full text
Get full text
Get full text
Thesis -
20
Development of a particle swarm optimisation model for estimating the homogeneity of a mixture inside a newly designed CNG-H2-AIR mixer for a dual fuel engine: an experimental and...
Published 2018“…The particle swarm optimisation (PSO) algorithm was used to solve an optimisation problem and achieve this outcome. …”
Get full text
Get full text
Get full text
Article
