Search Results - (( developing using generalised algorithm ) OR ( java implementation level algorithm ))
Search alternatives:
- generalised algorithm »
- implementation level »
- java implementation »
- developing using »
- level algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Ball surface representations using partial differential equations
Published 2015“…Thus, this research develops an algorithm to generalise Ball surfaces from boundary curves using elliptic PDEs. …”
Get full text
Get full text
Get full text
Thesis -
4
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
5
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
6
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
7
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
8
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
9
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
10
Not seeing the forest for the trees: Generalised linear model out-performs random forest in species distribution modelling for Southeast Asian felids
Published 2023“…Two of the most frequently applied algorithms to model species-habitat relationships are Generalised Linear Models (GLM) and Random Forest (RF). …”
Get full text
Get full text
Article -
11
Solving Boundary Value Problems for Ordinary Differential Equations Using Direct Integration and Shooting Techniques
Published 1999“…A generalised variable order variable stepsize Direct Integration (01) method, a generalised Backward Differentiation method (BDF) and shooting techniques are used to solve the given BVP. …”
Get full text
Get full text
Thesis -
12
Fault diagnosis in unbalanced radial distribution networks using generalised regression neural network
Published 2011“…Nowadays, about 80% of interruptions are caused by faults in distribution networks and the application of fault location algorithms developed for transmission system is not an easy task due to the topology and operating principles of the distribution networks. …”
Get full text
Get full text
Thesis -
13
Methodology to develop heuristic for re-entrant flow shop with two potential dominant machines using bottleneck approach
Published 2012“…This paper presents a bottleneck-based methodology to solve scheduling problem of M1,M2,M3,M4,M3,M4 re-entrant flow shop where M1 and M4 have high tendency of being the dominant machines. Two generalised makespan algorithms using bottleneck approach were developed for the identified bottleneck. …”
Get full text
Get full text
Article -
14
Adaptive artificial neural network for power system security assessment and control action
Published 2012“…This is particularly important for giving a possible control action to mitigate an insecure situation during disturbance using AANN. This technique is used to improve the performance and to develop a software tool which is integrated with PSS™E software for contingency analysis. …”
Get full text
Get full text
Thesis -
15
Secure E-Voting With Blind Signature
Published 2003“…In this system, voter’s privacy is guaranteed by using a blind signature for confidentiality and voter’s digital signature for voter’s authentication. E-Voting is implemented by employing Java socket technology and BouncyCastle cryptography provider. …”
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Explicit solution of parameter estimate using multiparametric programming for boost converter
Published 2023“…This work proposes an approach to estimate the parameters of capacitance and inductance in a boost converter using an explicit solution. A multiparametric programming (MPP) algorithm is fundamental to the suggested methodology, which aims to develop parameters as explicit functions of measurements. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Transtheoretical model of change for weight control in Malaysian context
Published 2010“…Empirical support of the effectiveness of weight control using Transtheoretical Model of Change (TIM) as the framework have been demonstrated by some studies and clinical practice for weight control in developed countries. …”
Get full text
Get full text
Get full text
Thesis -
19
Breast cancer disease classification using fuzzy-ID3 algorithm based on association function
Published 2022“…The FID3-AF algorithm is a hybridisation of the fuzzy system, the iterative dichotomizer 3 (ID3) algorithm, and the association function. …”
Get full text
Get full text
Get full text
Article -
20
Visualisasi pohon sintaksis berasaskan model dan algoritma sintaks ayat bahasa Melayu
Published 2018“…It can be concluded that the algorithm and model proposed were useful for the development of the prototype. …”
Get full text
Get full text
Get full text
Get full text
Thesis
