Search Results - (( java implementation based algorithm ) OR ( using random using (algorithmic OR algorithms) ))

Refine Results
  1. 1

    On randomness of compressed data using non-parametric randomness tests by Al-Khayyat, Kamal A., Alshaikhli, Imad Fakhri Taha, Vijayakumar, V.

    Published 2018
    “…Four randomness tests were used to test the outputs (compressed files) of four lossless compressions algorithms: JPEG-LS and JPEG-2000 algorithms are image-dedicated algorithms, while 7z and Bzip2 algorithms are generalpurpose algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Randomness improvement of AES using MKP by Al-Alak, Saif, Zukarnain, Zuriati, Abdullah, Azizol, Subramiam, Shamala

    Published 2013
    “…In previous work we proposed a Multiple-key Protocol (MKP) for AES algorithm. In this paper we tested the randomness of MKP-AES algorithm by using the diehard statistical tests software. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  4. 4
  5. 5
  6. 6

    Node placement optimization using extended virtual force and cuckoo search algorithm in wireless sensor network by Puteri Azwa, Ahmad

    Published 2014
    “…The EVFA approach can relocate the sensor nodes using a repulsive and attractive force after initial deployment and CS algorithm is more efficient in exploring the search of maximum coverage area in random deployment. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Security analysis of blowfish algorithm by Alabaichi, Ashwak Mahmood, Ahmad, Faudziah, Mahmod, Ramlan

    Published 2013
    “…We analyzed the randomness of the Blowfish output in an earlier paper titled “Randomness Analysis on Blowfish Block Cipher using ECB and CBC Modes”. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A fault syndromes simulator for random access memories by Wan Hasan, Wan Zuha, Abdul Halim, Izhal, Mohd Sidek, Roslina, Othman, Masuri

    Published 2008
    “…At present, the March test algorithm is used to detect and diagnose all faults related to Random Access Memories. …”
    Get full text
    Get full text
    Article
  9. 9

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  11. 11

    African Buffalo Optimization and the Randomized Insertion Algorithm for the Asymmetric Travelling Salesman’s Problems by Odili, Julius Beneoluchi, M. N. M., Kahar, Noraziah, Ahmad, Odili, Esther Abiodun

    Published 2016
    “…Similarly, both methods employ different search techniques in attempting solutions to the ATSP: while the African Buffalo Optimization uses the modified Karp-Steele technique, the Randomized Insertion employs random insertion mechanism. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Classification of Diabetes Mellitus (DM) using Machine Learning Algorithms by Sirajun Noor, Noor Azmiya

    Published 2021
    “…Whereas for the German Frankfurt dataset, best DM classification model was found using Random Forest algorithm with an accuracy of 98.77%.…”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Real-Time State of Charge Estimation of Lithium-Ion Batteries Using Optimized Random Forest Regression Algorithm by Hossain Lipu M.S., Hannan M.A., Hussain A., Ansari S., Rahman S.A., Saad M.H.M., Muttaqi K.M.

    Published 2024
    “…This paper presents an improved machine learning approach for the accurate and robust state of charge (SOC) in electric vehicle (EV) batteries using differential search optimized random forest regression (RFR) algorithm. …”
    Article
  14. 14

    Hybrid optimization approach to estimate random demand by Wahab, Musa, Ku-Mahamud, Ku Ruhana, Yasin, Azman

    Published 2012
    “…The main objective of this study is to develop a demand forecasting model that should reflect the characteristics of random demand patterns.To accomplish this goal, a hybrid algorithm combining a genetic algorithm and a local search algorithm method was developed to overcome premature convergence in local optima problems.The performance of the hybrid algorithm was compared with a single algorithm model in estimating parameter values that minimize objective function which was used to measure the goodness-of-fit between the observed data and simulated results.However, two problems had to be overcome in the forecasting random demand model. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Security analysis of blowfish algorithm by Al-Abiachi, Ashwak M., Ahmad, Faudziah, Mahmod, Ramlan

    Published 2013
    “…Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key lengths from 32 bits up to a maximum of 448 bits.In order to measure the degree of security of blowfish algorithm, some cryptographic tests must be applied such as randomness test, avalanche criteria and correlation coefficient.In this paper we attempt to analyze the security of blowfish using avalanche criteria and correlation coefficient.We analyzed the randomness of the Blowfish output in an earlier paper titled “Randomness Analysis on Blowfish Block Cipher using ECB and CBC Modes”. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    A Comparative Study of African Buffalo Optimization and Randomized Insertion Algorithm for Asymmetric Travelling Salesman's Problem by Odili, Julius Beneoluchi, M. N. M., Kahar, Shahid, Anwar, Azrag, M. A. K.

    Published 2015
    “…The Randomized Insertion and African Buffalo Optimization algorithms employ two different methods in attempting solutions to ATSP: the African Buffalo Optimization employs the modified Karp-Steele approach while the Randomized Insertion uses random insertion approach. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    New random approaches of modified adaptive bats sonar algorithm for reservoir operation optimization problems by Nor Shuhada, Ibrahim

    Published 2024
    “…Subsequently, it is exploring into the development of random approaches based on MABSA, integrating components into others algorithm whereby Squirrel Search Algorithm (SSA), Cauchy Mutation (CM) approach, and Doppler Effect (DE) phenomenon. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Comparison of Logistic Regression, Random Forest, SVM, KNN Algorithm for Water Quality Classification Based on Contaminant Parameters by Teguh, Sutanto, Muhammad Rafli, Aditya, Haldi, Budiman, M.Rezqy, Noor Ridha, Usman, Syapotro, Noor, Azijah

    Published 2024
    “…The purpose of this study is to evaluate and compare the performance of these algorithms in terms of accuracy. The methodology used includes data collection, preprocessing, and algorithm implementation with evaluation using crossvalidation techniques. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    ABC: android botnet classification using feature selection and classification algorithms by Abdullah, Zubaile, Mohd Saudi, Madihah, Anuar, Nor Badrul

    Published 2017
    “…The Information Gain algorithm is used to select the most significant permissions, then the classification algorithms Naïve Bayes, Random Forest and J48 used to classify the Android apps as botnet or benign apps. …”
    Get full text
    Get full text
    Article