Search Results - (( java implementation level algorithm ) OR ( based evaluation case algorithm ))
Search alternatives:
- implementation level »
- java implementation »
- based evaluation »
- level algorithm »
- evaluation case »
- case algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
4
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
5
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
6
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
8
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
9
Case Slicing Technique for Feature Selection
Published 2004“…This technique with k = 10 has been used in this thesis to evaluate the proposed approach. CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
Get full text
Get full text
Thesis -
10
A comparative study on ant-colony algorithm and genetic algorithm for mobile robot planning.
Published 2024“…In conclusion, the study successfully identifies key features in warehouses routing, implements ACO and GA algorithms, and evaluates the performance based on achieved routes and distance.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
T-way testing : a test case generator based on melody search algorithm
Published 2015“…Next, TTT-MS will be executed through main algorithms to generate Parameters Interaction List, Parameter Values Interaction List, and finally generate final Test Cases based on Melody Search Algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
13
Test Cases Minimization Strategy Based On Flower Pollination Algorithm
Published 2016“…This paper describes the adoption of Flower Pollination Algorithm (FPA) in order to minimize the test cases. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Flexible window-based scheduling with critical worst case latency evaluations for real time traffic in time sensitive networks
Published 2022“…In the third part, the worst-case AVB latency under overlapping-based TT windows (AVB-OBTTW) algorithm is presented to examine the OFWOS effects on AVBlatency performance, where represents an AVB queue, i.e., { }. …”
Get full text
Get full text
Thesis -
15
Comparative Performance Analysis of Flower Pollination Algorithm and Harmony Search based strategies: A Case Study of Applying Interaction Testing in the Real World
Published 2016“…In this paper, we present a comparison between two strategies, Harmony Search (HS) and Flower Pollination Algorithm (FPA) based strategies. Our experiments have performed on a real-world case study. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
A novel hybrid evolutionary mating algorithm for Covid19 confirmed cases prediction based on vaccination
Published 2023“…As a result, developing robust mathematical models with small error margins for predictions is crucial. Based on these findings, a combined method of evaluating confirmed cases of COVID-19 with universal immunization is recommended. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity
Published 2015“…This paper propose an optimized regression test case selection and prioritization for object-oriented software based on dependence graph model analysis of the source code and optimized the selected test case using Genetic Algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
18
Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal
Published 2006Get full text
Get full text
Conference or Workshop Item -
19
A regression test case selection and prioritization for object-oriented programs using dependency graph and genetic algorithm
Published 2014“…The approach is based on optimization of selected test case from test suite T. …”
Get full text
Get full text
Get full text
Article -
20
Enhanced genetic algorithm optimization model for a single reservoir operation based on hydropower generation: case study of Mosul reservoir, northern Iraq
Published 2016“…The first algorithm was based on the traditional simulation of reservoir operation, whilst the second algorithm (Salg) enhanced the GAOM by changing the population values of GA through a new simulation process of reservoir operation. …”
Get full text
Get full text
Get full text
Article
