Search Results - (( java implementation level algorithm ) OR ( framework implementation from algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal
  7. 7

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation by Mat Jani H., Lee S.P.

    Published 2023
    “…The main objective of this paper is to propose and implement an intelligent framework documentation approach that integrates case-based learning (CBL) with genetic algorithm (GA) and Knuth-Morris-Pratt (KMP) pattern matching algorithm with the intention of making learning a framework more effective. …”
    Conference paper
  9. 9

    Low-level hybridization scripting language with dynamic parameterization in PSO-GA / Suraya Masrom by Masrom, Suraya

    Published 2015
    “…The scripting language is designed and developed based on the algorithm structure that is defined in the proposed implementation frameworks with the dynamic parameterization. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment by Perumal, Thinagaran

    Published 2011
    “…The first algorithm, named as Framework Initialization algorithm, is developed to initialize the framework and discovering the subsystems configured in order to derive the interoperation tasks. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A BBN-based framework for adaptive IP-reuse by Azman, Amelia Wong, Bigdeli, Abbas, Biglari-Abhari, Morteza, Mohd Mustafah, Yasir, Lovell, Brian

    Published 2009
    “…The complexity of implementing vision algorithm on embedded systems can greatly benefit from research in HW/SW partitioning and IP-reuse. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Implementation of perez-dumortier calibration algorithm by Jedol Dayou, Chang, Jackson Hian Wui, Justin Sentian

    Published 2014
    “…The implementation of the filtration procedure in step-by-step is discussed to render better framework of the proposed calibration algorithm. …”
    Get full text
    Get full text
    Get full text
    Chapter In Book
  15. 15

    Genetic algorithm based ensemble framework for sentiment analysis by Lai, Po Hung

    Published 2018
    “…From the results, the framework was able to suggest combination of methods which produced accurate results with reduced feature sets.…”
    Get full text
    Get full text
    Thesis
  16. 16

    Immune-based technique for undergraduate programmes recommendation / Muhammad Azrill Mohd Zamri by Mohd Zamri, Muhammad Azrill

    Published 2017
    “…Based on the framework, a prototype was implemented to evaluate the accuracy of the proposed technique. 52% is the highest accuracy obtained from the technique by using ten-fold cross validation. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A Telemedicine Tool Framework For Lung Sounds Classification Using Ensemble Classifier Algorithms by Abd, Sura Khalil, Shakeel, P.Mohamed, M.A., Burhanuddin, Jaber, Mustafa Musa, Mohammed, Mohammed Abdulameer, Yussof, Salman

    Published 2020
    “…The overall classification accuracy for the Improved Random Forest algorithm has 99.04%. The telemedicine framework was implemented with the Improved Random Forest algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Rapid software framework for the implementation of machine learning classification models by Rahman, A.S.A., Masrom, S., Rahman, R.A., Ibrahim, R.

    Published 2021
    “…This paper provides an insight of a rapid software framework for implementing machine learning. This paper also demonstrates the empirical research results of machine learning classification models from the rapid software framework. …”
    Get full text
    Get full text
    Article
  19. 19

    Financial time series predicting using machine learning algorithms by Tiong, Leslie Ching Ow *

    Published 2013
    “…Thereafter, Artificial Neural Network (ANN) and Support Vector Machine (SVM) algorithms are implemented separately to train with the trend patterns for predicting the movement direction of financial trends. …”
    Get full text
    Thesis
  20. 20

    A technical framework analysis of digital twin control algorithms for HVAC-BMS Integration and implementation challenges for Malaysian green buildings by Norazam, Nur Muhamad Afif, Mohd Noh, Hamidun, Ishak, Mohd Hafizal, Zulkefli, Nursyazwani, Jumali, Muhammad Arif, Brown, Jeffery Jep

    Published 2025
    “…Break-even points typically occur between 2.2 - 3.1 years, with ROI averaging 120% - 150% over five years. Security implementation increased dramatically from 34% prior to 2022 to 87%.…”
    Get full text
    Get full text
    Get full text
    Article