Search Results - (( developing evaluation process algorithm ) OR ( java implementation level algorithm ))

Refine Results
  1. 1

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal
  6. 6

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Development Of Double Stage Filter (DSF) On Stereo Matching Algorithm For 3D Computer Vision Applications by Teo, Chee Huat

    Published 2016
    “…In order to remove the unwanted aspects, two stages filtering process are needed along with the developed approaches in the phase 2 of DSF algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Modelling and environmental assessment of heterogeneous catalysis biodiesel process using war algorithm by As Eleyana, Ali

    Published 2013
    “…WAR algorithm, a methodology for determining the potential environmental impact (PEI) of a chemical process is developed to describe the flow and the generation of PEI through a chemical process. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    Sudoku Generator based on hybrid algorithm / Faridah Abdul Rahman by Abdul Rahman, Faridah

    Published 2012
    “…The hybrid algorithm is applied in prototype development where in process on solving Sudoku. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Review of the research landscape of multi-criteria evaluation and bench- marking processes for many-objective optimisation methods: coherent taxonomy, challenges and recommended so... by Mohammed, R. T., Yaakob, R., Zaidan, A. A., Sharef, N. M., Abdullah, R. H., Zaidan, B. B., Dawood, K. A.

    Published 2020
    “…The rapid development of new optimization algorithms for solving problems with many objectives has increased the necessity of developing performance indicators or metrics for evaluating the performance quality and comparing the competing optimization algorithms fairly. …”
    Get full text
    Get full text
    Article
  13. 13

    Development of lecturers' publication score algorithm / Zamali Tarmudi and Haijon Gunggut by Zamali Tarmudi, Haijon Gunggut

    Published 2016
    “…The results showed that, the proposed algorithm is highly beneficial to the evaluation committee and can significantly reduce the time consumed in the evaluation process . …”
    Get full text
    Get full text
    Article
  14. 14

    Enhanced Image View Synthesis Using Multistage Hybrid Median Filter For Stereo Images by Ali Hussein Aboali, Maged Yahya

    Published 2018
    “…Disparity depth map estimation of stereo matching algorithm is one of the most active research topics in computer vision.In the field of image processing,many existing stereo matching algorithms to obtain disparity depth map are developed and designed with low accuracy.To improve the accuracy of disparity depth map is quite challenging and difficult especially with uncontrolled dynamic environment.The accuracy is affected by many unwanted aspects including random noises,horizontal streaks,low texture,depth map non-edge preserving, occlusion,and depth discontinuities.Thus,this research proposed a new robust method of hybrid stereo matching algorithm with significant accuracy of computation.The thesis will present in detail the development,design, and analysis of performance on Multistage Hybrid Median Filter (MHMF).There are two main parts involved in our developed method which combined in two main stages.Stage 1 consists of the Sum of Absolute Differences (SAD) from Basic Block Matching (BBM) algorithm and the part of Scanline Optimization (SO) from Dynamic Programming (DP) algorithm.While,Stage 2 is the main core of our MHMF as a post-processing step which included segmentation,merging, and hybrid median filtering.The significant feature of the post-processing step is on its ability to handle efficiently the unwanted aspects obtained from the raw disparity depth map on the step of optimization.In order to remove and overcome the challenges unwanted aspects, the proposed MHMF has three stages of filtering process along with the developed approaches in Stage 2 of MHMF algorithm.There are two categories of evaluation performed on the obtained disparity depth map: subjective evaluation and objective evaluation.The objective evaluation involves the evaluation on Middlebury Stereo Vision system and evaluation using traditional methods such as Mean Square Errors (MSE),Peak to Signal Noise Ratio (PSNR) and Structural Similarity Index Metric (SSIM).Based on the results of the standard benchmarking datasets from Middlebury,the proposed algorithm is able to reduce errors of non-occluded and all errors respectively.While,the subjective evaluation is done for datasets captured from MV BLUE FOX camera using human's eyes perception.Based on the results,the proposed MHMF is able to obtain accurate results, specifically 69% and 71% of non-occluded and all errors for disparity depth map, and it outperformed some of the existing methods in the literature such as BBM and DP algorithms.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Environmental Assessment of Alkali-Catalysed Biodiesel Process Using War Algorithm by Siti Faiznur, Daud

    Published 2013
    “…Hence to determine the PEI value, WAR Algorithm is then introduced. It is used to evaluate the environmental friendliness of a process and was carried out by using the developed Microsoft Excel spread sheet. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    Literature Survey On Stereo Vision Disparity Map Algorithms by Rostam Affendi, Hamzah, Haidi, Ibrahim

    Published 2016
    “…To assist future researchers in developing their own stereo matching algorithms, a summary of the existing algorithms developed for every stage of processing is also provided. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Development of high quality speech compression system for Quranic recitation based on modified CELP algorithm by Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2013
    “…Lastly, we evaluate the performance of the developed algorithm objectively using PESQ (Perceptual Evaluation of Speech Quality). …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Implementation of generalized predictive control (GPC) for a real-time process control using labview by Mohd. Faudzi, Ahmad 'Athif

    Published 2006
    “…As for this, real time control will be applied to the coupled tank as the test bed for level control process. Experimental evaluation and comparison of the predictive algorithm performance will be benchmarked against PID control. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…In this system, voter’s privacy is guaranteed by using a blind signature for confidentiality and voter’s digital signature for voter’s authentication. E-Voting is implemented by employing Java socket technology and BouncyCastle cryptography provider. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    A refined differential evolution algorithm for improving the performance of optimization process by A. R., Yusoff, Nafrizuan, Mat Yahya

    Published 2011
    “…Among the latest Evaluation Algorithm (EA) have been developed is Differential Evolution (DE). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item