Search Results - (( developing intelligence selection algorithm ) OR ( java implementation level algorithm ))
Search alternatives:
- developing intelligence »
- intelligence selection »
- implementation level »
- selection algorithm »
- java implementation »
- level algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Optimisation of Environmental Risk Assessment Architecture using Artificial Intelligence Techniques
Published 2024“…Fuzzy arithmetic operations on fuzzy numbers and artificial neural networks with a back-propagation learning algorithm were used to represent the structure of the neuro-fuzzy risk assessment model, whereas genetic algorithms were used to develop the safe path selection model. …”
thesis::doctoral thesis -
4
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
5
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In order to develop an intelligent agent, various programming techniques are used in achieving the property of self learning, information retrieval and searching algorithm. …”
Get full text
Get full text
Thesis -
6
Bats echolocation-inspired algorithms for global optimisation problems
Published 2016“…The works related to swarm intelligence algorithms include the development of the algorithm itself, its modification and improvisation as well as its application in solving global optimisation problems. …”
Get full text
Get full text
Thesis -
7
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
8
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
9
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
10
Swarm intelligence-based feature selection for amphetamine-type stimulants (ATS) drug 3D molecular structure classification
Published 2021“…For this purpose, the binary version of swarm algorithms facilitated with the S-shaped or sigmoid transfer function known as binary whale optimization algorithm (BWOA), binary particle swarm optimiza-tion algorithm (BPSO), and new binary manta-ray foraging opti-mization algorithm (BMRFO) are developed for feature selection. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y...
Published 2017“…To develop intelligent leak detection system through Hilbert-Huang Transform (HHT) analysis, the selection for IMF must be automated and self-decision making process through the system. …”
Get full text
Get full text
Article -
12
Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz)
Published 2017“…To develop intelligent leak detection system through Hilbert-Huang Transform (HHT) analysis, the selection for IMF must be automated and self-decision making process through the system. …”
Get full text
Get full text
Get full text
Article -
13
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Apart from that, sizing algorithm with DEA was also discovered to outperform sizing algorithms with selected computational intelligence, i.e. …”
Get full text
Get full text
Thesis -
14
Effect of input variables selection on energy demand prediction based on intelligent hybrid neural networks
Published 2015“…In this paper, the important issues related with the best input variable selection for a hybrid model is addressed. A hybrid approach that combines ANN and an evolutionary optimization technique, genetic algorithm (GA) is used for the development of a short term load forecast (STLF) model. …”
Get full text
Get full text
Article -
15
Classification Algorithms and Feature Selection Techniques for a Hybrid Diabetes Detection System
Published 2021“…The proposed method has three steps: preprocessing, feature selection and classification. Several combinations of Harmony search algorithm, genetic algorithm, and particle swarm optimization algorithm are examined with K-means for feature selection. …”
Get full text
Get full text
Get full text
Article -
16
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
17
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
18
A meta-heuristics based input variable selection technique for hybrid electrical energy demand prediction models
Published 2017“…The results show that the neural network optimized with genetic algorithm and trained with an optimally and intelligently selected input vector containing historical load and meteorological variables produced the best prediction accuracy. …”
Get full text
Get full text
Article -
19
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
Published 2022“…The model design is Decision Tree (DT) algorithm-based, with an approach to data balancing since the data set used is highly unbalanced and one more approach for feature selection. …”
Get full text
Get full text
Article -
20
Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process
Published 2004“…Artificial Neural Network (ANN) was selected from Machine Learning Algorithms to be the learning algorithm. …”
Get full text
Get full text
Thesis
