Search Results - (( developing fraction efficient algorithm ) OR ( java implementation level algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A new modern scheme for solving fractal–fractional differential equations based on deep feedforward neural network with multiple hidden layer by Admon, Mohd Rashid, Senu, Norazak, Ahmadian, Ali, Majid, Zanariah Abdul, Salahshour, Soheil

    Published 2024
    “…The recent development of knowledge in fractional calculus introduced an advanced superior operator known as fractal–fractional derivative (FFD). …”
    Get full text
    Get full text
    Article
  6. 6

    Computational approach via half-sweep and preconditioned aor for fractional diffusion by Andang Sunarto, Praveen Agarwal, Jumat Sulaiman, Jackel Vui Lung Chew

    Published 2022
    “…The convergence of the developed method is analyzed. Finally, some numerical experiments from our research are given to illustrate the efficiency of our computational approach to solve the proposed problems of time-fractional diffusion. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal
  10. 10

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Non-Parametric and Parametric Estimations of Cure Fraction Using Right-and Interval-Censored Data by Aljawdi, Bader

    Published 2011
    “…The major research findings were as follows: 1) the non-parametric and parametric estimation methods using the right and interval censoring types produced highly efficient cure rate parameters when the censoring rate was decreased to the minimum possible; 2) Non-parametric estimation of the cure fraction using interval censored data based on Turnbull estimator resulted in more precise cure fraction than the Kaplan Meier estimator considering the interval midpoint to represent the exact life time; 3) The parametric estimation of the cure fraction based on the exponential distribution and right and interval censoring types produced more consistent estimates than the Weibull distribution especially in case of heavy censoring; 4) Parametric estimation of the cure fraction was more efficient when some covariates had been involved in the analysis than when covariates had been excluded; and 5) the nonparametric estimation method is the viable alternative to the parametric one when the data set contains substantial censored observations while in the case of low censoring the parametric method is more attractive.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Development of rule-based advisory system from modified hazard and operability study on fatty acid fractionation column by M. Yunus, M. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2003
    “…A modified Hazard and Operability Study (HAZOP) algorithm has been proposed in order to develop process deviation relationships between two study nodes in HAZOP study. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Parametric cure fraction models for interval-censoring with a change-point based on a covariate threshold by Ali Taweab, Fauzia

    Published 2015
    “…Therefore, this study focuses on developing several classes of parametric survival cure models for interval-censored data incorporating a cure fraction and change-point effect in covariate. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Fault detection and diagnosis using correlation coefficients by Mak, Weng Yee

    Published 2005
    “…A fractionation column from a palm oil fractionation plant is chosen as the case study and the model of the case study is simulated in Matlab. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Multi-Objective Optimization of Solar Powered Irrigation System by Using Genetic Algorithm by Mohd Tholaat, Muhammad Ali Husaini

    Published 2015
    “…However, this complex system needs to be optimized by using suitable metaheuristic technique in order to make the design to be economically and practically efficient. Thus, Genetic Algorithm is applied to solve multiple objective solar-irrigation system optimization. …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    Polynomial neural network for solving Caputo-conformable fractional Volterra–Fredholm integro-differential equation with three-point non-local boundary conditions by Alsa’di, Kawthar, Nik Long, Nik Mohd Asri, Senu, Norazak, Eshkuvatov, Z.K.

    Published 2025
    “…A hybrid technique, combining a polynomial neural network (PNN) with an extreme learning machine algorithm without using any activation functions, is developed. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A hybrid technique of deep learning neural networks with finite difference method for higher order fractional Volterra-Fredholm integro-differential equations with φ-Caputo operato... by Alsa’Di, Kawthar, Nik Long, Nik Mohd Asri

    Published 2025
    “…The numerical examples demonstrated the efficiency of the proposed method in solving the complicated higher order fractional problems of linear and non-linear terms.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    An advanced scheme based on Artificial Intelligence technique for solving nonlinear Riccati systems by Admon, Mohd Rashid, Senu, Norazak, Ahmadian, Ali, Abdul Majid, Zanariah

    Published 2024
    “…A vectorization algorithm is designated for the selected step to make the computation process more efficient. …”
    Get full text
    Get full text
    Article