Search Results - (( java implementation level algorithm ) OR ( knowledge generation using algorithm ))
Search alternatives:
- implementation level »
- knowledge generation »
- java implementation »
- generation using »
- level algorithm »
- using algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
4
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
5
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
6
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
8
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
9
Comparative study of apriori-variant algorithms
Published 2016“…However, the algorithm suffers from scanning time problem while generating candidates of frequent itemsets.This study presents a comparative study between several Apriori-variant algorithms and examines their scanning time.We performed experiments using several sets of different transactional data.The result shows that the improved Apriori algorithm manage to produce itemsets faster than the original Apriori algorithm.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Knowledge base tuning using genetic algorithm for fuzzy behavior-based autonomous mobile robot
Published 2005“…The scheme is validated using parameters of MagellanPro mobile robot and tested by simulation using MATLAB/ SIMULINK. …”
Get full text
Get full text
Conference or Workshop Item -
11
An initial state of design and development of intelligent knowledge discovery system for stock exchange database
Published 2004“…We divide our problem in two modules.In first module we define Fuzzy Rule Base System to determined vague information in stock exchange databases.After normalizing massive amount of data we will apply our proposed approach, Mining Frequent Patterns with Neural Networks.Future prediction (e.g., political condition, corporation factors, macro economy factors, and psychological factors of investors) perform an important rule in Stock Exchange, so in our prediction model we will be able to predict results more precisely.In second module we will generate clustering algorithm. Generally our clustering algorithm consists of two steps including training and running steps.The training step is conducted for generating the neural network knowledge based on clustering.In running step, neural network knowledge based is used for supporting the Module in order to generate learned complete data, transformed data and interesting clusters that will help to generate interesting rules.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Eye Diagram Modeling Of High-Speed Channels Using Artificial Neural Networks With An Improved Adaptive Sampling Algorithm
Published 2019“…The adaptive sampling technique is used for the data generation due to its flexibility where it generates samples according to the non-linearity of the regions in the design space. …”
Get full text
Get full text
Thesis -
13
New Learning Models for Generating Classification Rules Based on Rough Set Approach
Published 2000“…Recently, different models were used to generate knowledge from vague and uncertain data sets such as induction decision tree, neural network, fuzzy logic, genetic algorithm, rough set theory, and others. …”
Get full text
Get full text
Thesis -
14
Secure E-Voting With Blind Signature
Published 2003“…In this system, voter’s privacy is guaranteed by using a blind signature for confidentiality and voter’s digital signature for voter’s authentication. E-Voting is implemented by employing Java socket technology and BouncyCastle cryptography provider. …”
Get full text
Get full text
Conference or Workshop Item -
15
Comparison between Market Basket Analysis and Partition Around Medoids clustering for knowledge discovering in consumer consumption pattern / Mohammad Adha Ruslan, Nurul Shahira Mo...
Published 2019“…The main purpose of this study are to compare the knowledge discovery between Market Basket Analysis and Partition Around Medoids and followed by to generate a customer buying pattern by using Market Basket Analysis (MBA) Algorithm and Partition Around Medoids (PAM) Clustering Algorithm. …”
Get full text
Get full text
Student Project -
16
Test case minimization applying firefly algorithm
Published 2018Get full text
Get full text
Get full text
Article -
17
Discovering Pattern in Medical Audiology Data with FP-Growth Algorithm
Published 2012“…There is potential knowledge inherent in vast amounts of untapped and possibly valuable data generated by healthcare providers. …”
Get full text
Get full text
Conference or Workshop Item -
18
Hybrid subjective evaluation method using weighted subsethood - based (WSBA) rule generation algorithm
Published 2013“…The use of fuzzy rules, which were extracted directly from input data through Weighted Subsethood-based (WSBA) Rule Generation Algorithm.WSBA rule generation use the subsethood values to generate the weights which finally produced the fuzzy general rules.The rules generated through the data provided knowledge in developed fuzzy rule The fuzzy rules embedded in the framework of subjective evaluation method showed advantages in generalizing the evaluation of the performance achievement, where the evaluation process can be conducted consistently in producing good evaluation results with the use of the membership set score.The results from the numerical examples are comparable to other fuzzy evaluation methods, even with the use of small rule size.…”
Get full text
Get full text
Get full text
Article -
19
Combining object-based classification and data mining algorithm to classify urban surface materials from worldview-2 satellite image
Published 2014“…In this study, Data Mining was performed using C4.5 algorithm to select the appropriate attributes for object-based classification. …”
Get full text
Conference or Workshop Item -
20
