Search Results - (( java implementation level algorithm ) OR ( based aggregation based algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Verification of correctness properties for aggregation behavior of swarm robotics system using spin model checker / Siti Shafinaz Ali by Ali, Siti Shafinaz

    Published 2015
    “…From the previous researcher, the aggregation algorithm based on the Probabilistic Finite State Automata (PFSA) is derived from the study of cockroach behavior. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Verification correctness properties for aggregation behavior of swarm robotics system using SPIN model checker / Siti Shafinaz Ali by Ali, Siti Shafinaz

    Published 2015
    “…From the previous researcher, the aggregation algorithm based on the Probabilistic Finite State Automata (PFSA) is derived from the study of cockroach behavior. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Performance evaluation of different data aggregation algorithms for different types of sensors in WSN based cluster by Ali, Wala'a Hussein

    Published 2018
    “…In this project three different data aggregation algorithms coding schemes based relative difference (CS-RD), an adaptive method of data aggregation that exploits the spatial correlation between the sensor nodes (ADAM) and coding schemes based the factor of precision (CS-FP) are evaluated. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A scheduling algorithm for bandwidth aggregation in heterogeneous wireless network by Masud, M.H., Abd Latif, Suhaimi, Anwar, Farhat, Alam, M. K.

    Published 2014
    “…However, the selection of Radio Access Technology (RAT) for aggregation in HWN is a great challenge. This paper proposes a scheduling algorithm for RAT selection in HWN for bandwidth aggregation. …”
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Local-based stereo matching algorithm using multi-cost pyramid fusion, hybrid random aggregation and hierarchical cluster-edge refinement by Kadmin, Ahmad Fauzan

    Published 2023
    “…Then, a new proposed cost aggregation based on the Hybrid Random Aggregation (HA) was implemented that utilized modified Iterative Non-Local Guided Filter (iNLGF), Simple Linear Iterative Clustering (SLIC), Graph Segmentation (GS) and Extended Restart Random Walk (eRWR) for error reduction. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Data redundancy reduction scheme for data aggregation in wireless sensor network by Adawy, Mohammad Ibrahim

    Published 2020
    “…However, many issues are explored in the clustered-based data aggregation and reduced data aggregation efficiency. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Enhanced local disparity map algorithm segment-side window-based cost aggregation and refinement by Kadmin, Ahmad Fauzan, Al-Asbahi, Monther Yousef Abdulwasea Mohammed, Hamzah, Rostam Affendi, A Aziz, Khairul Azha, Zainal, Nasharuddin, Jazlan, Nabil Jazli

    Published 2025
    “…This paper introduces a Segment-Side Window based (SSW) stereo matching algorithm that combines Truncated Absolute Difference (TAD), Gradient Magnitude (GM), and Census Transform (CT) to build a robust cost volume. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat

    Published 2017
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Book Section
  13. 13
  14. 14

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Adaptive resource allocation algorithms with QoS support based on network conditions using fuzzy logic system for IEEE 802.11n networks / Bakeel Hussein Naji Maqhat by Naji Maqhat, Bakeel Hussein

    Published 2016
    “…The second contribution is an efficient bandwidth allocation algorithm for A-MSDU aggregation called Adaptive Scheduling based Embedded Fuzzy (ASEF) system. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal
  17. 17

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Performance analyses of adaptive handover decision algorithm using spectrum aggregation in long term evolution - advanced network by Usman, I. H., Nordin, N. K., Omizegba, E. E., Sali, A., Rasid, M. F. A., Hashim, F.

    Published 2021
    “…The proposed TVWS algorithm showed average low RLF rate values than the Conventional (CONV) and Multi-Influence Factors Handover Decision Algorithms (MIF-HODA). …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Multi-criteria handover decision for heterogeneous networks: carrier aggregation deployment scenario by Ahmed, Maryam Abdulazeez, Noordin, Nor Kamariah, Sali, Aduwati, Hashim, Fazirulhisyam

    Published 2020
    “…The multicriteria handover decision making algorithm-based method chooses among the cells that satisfy the requirements for the handover. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20