Search Results - (( java implementation level algorithm ) OR ( knowledge integration clustering algorithm ))
Search alternatives:
- integration clustering »
- knowledge integration »
- implementation level »
- java implementation »
- level algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Automatic clustering of gene ontology by genetic algorithm
Published 2006“…Abstract—Nowadays, Gene Ontology has been used widely by many researchers for biological data mining and information retrieval, integration of biological databases, finding genes, and incorporating knowledge in the Gene Ontology for gene clustering. …”
Get full text
Get full text
Article -
3
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Hyper-heuristic framework for sequential semi-supervised classification based on core clustering
Published 2020“…The framework trains the NN on previously labeled data and its knowledge is used to calculate the error of the core online-offline clustering block. …”
Get full text
Get full text
Get full text
Article -
5
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
6
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
7
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
8
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
9
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…The system trains the NN on previously labelled data, and its knowledge is used to calculate the core online-offline clustering block error. …”
Get full text
Get full text
Thesis -
10
Centre based evolving clustering framework with extended mobility features for vehicular ad-hoc networks
Published 2021“…The developed CEC-GP also includes an integrated approach that combined all clustering tasks such as cluster formation, cluster head selection, and cluster maintenance. …”
Get full text
Get full text
Get full text
Thesis -
11
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
12
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Constrained clustering approach to aid in remodularisation of object-oriented software systems / Chong Chun Yong
Published 2016“…These practical concerns have led the researcher to propose the idea of integrating domain knowledge into traditional unsupervised clustering algorithms, herewith referred as constrained clustering, a semi-supervised clustering technique where domain experts can explicitly exert their opinions in the form of explicit clustering constraints to restrict whether a pair of software components should or should not be clustered into the same subsystem. …”
Get full text
Get full text
Thesis -
15
Kernel and multi-class classifiers for multi-floor wlan localisation
Published 2016“…For floor localisation, the strategy is based on developing the algorithm to determine the floor by utilising fingerprint clustering technique. …”
Get full text
Get full text
Thesis -
16
An assessment of sedimentation in Terengganu River, Malaysia using satellite imagery
Published 2023Article -
17
Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation
Published 2024“…In response to the current issues of poor real-time performance, high computational costs, and excessive memory usage of object detection algorithms based on deep convolutional neural networks in embedded devices, a method for improving deep convolutional neural networks based on model compression and knowledge distillation is proposed. …”
Get full text
Get full text
Article -
18
Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning
Published 2016“…Beside that, classic bag of visual words algorithm (BoVW) is based on kmeans clustering and every SIFT feature belongs to one cluster and it leads to decreasing classification results. …”
Get full text
Get full text
Thesis -
19
Chaotic mutation immune evolutionary programming for photovoltaic planning in power system / Sharifah Azma Syed Mustaffa
Published 2020“…The element of chaotic local search is also integrated into the algorithm for better performance. …”
Get full text
Get full text
Thesis -
20
Secure E-Voting With Blind Signature
Published 2003“…In this system, voter’s privacy is guaranteed by using a blind signature for confidentiality and voter’s digital signature for voter’s authentication. E-Voting is implemented by employing Java socket technology and BouncyCastle cryptography provider. …”
Get full text
Get full text
Conference or Workshop Item
