Search Results - (( java implementation level algorithm ) OR ( missing process using algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Detection Of Misplaced And Missing Regions In Image Using Neural Network by Tan , Jin Siang

    Published 2017
    “…The neural network uses the RGB value from the image processing phase and analyzes the regions to check whether there is misplaced or missing jigsaw puzzle. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    Missing tags detection algorithm for radio frequency identification (RFID) data stream by Zainudin, Nur 'Aifaa

    Published 2019
    “…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Auto-feed hyperparameter support vector regression prediction algorithm in handling missing values in oil and gas dataset by Amirruddin, A., Aziz, I.A., Hasan, M.H.

    Published 2020
    “…This problem inspires the idea to develop a prediction algorithm to predict the missing values in the dataset, where Support vector regression (SVR) has been proposed as a prediction method to predict missing values in several academic types of researches. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal
  11. 11

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Real time power quality event detection using continuous wavelet transform by Tan R.H.G., Ramachandaramurthy V.K.

    Published 2023
    “…A test bench setup with voltage sag generator is used to test the performance of the proposed algorithm. …”
    Conference paper
  13. 13

    Development of an imputation technique - INI for software metric database with incomplete data by Wasito, Ito, Olanrewaju, Rashidah F.

    Published 2007
    “…This technique was used for estimating missing data in a software engineering database (PROMISE). …”
    Get full text
    Get full text
    Get full text
    Book Section
  14. 14

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Missing point on the corner by using extension cases of advancing front mesh method by Awang, Noorehan, O. K. Rahmat, Rahmita Wirza, Ng, Seng Beng, Jaafar, Azmi, Sulaiman, Puteri Suhaiza, Ilias, Mohd Rijal

    Published 2020
    “…The holes focused was on the missing point on the corner of the object. In the algorithm, object was chosen and two procedure used to achieved the results. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Intelligent imputation method for mix data-type missing values to improve data quality by Alabadla, Mustafa R. A.

    Published 2024
    “…A common challenge is the occurrence of missing data during the data input process. Numerous studies have proposed methods to impute missing values for data across multiple fields. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Estimating Missing Precipitation to Optimize Parameters for Prediction of Daily Water Level Using Artificial Neural Network by Dayang Suhaila, Awang Suhaili

    Published 2006
    “…Bedup station located in Batang Sadong Basin, Sarawak.ANN is undoubtedly a strong tool for forecasting various non- linear hydrologic processes, including the missing precipitation and water level prediction. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  19. 19

    Tangible interaction learning model to enhance learning activity processes among children with dyslexia by Jamalai@Jamali, Siti Nurliana

    Published 2024
    “…A common challenge is the occurrence of missing data during the data input process. Numerous studies have proposed methods to impute missing values for data across multiple fields. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Crown counting and mapping of missing oil palm tree using airborne imaging system by Kee, Ya Wern

    Published 2019
    “…The total number of existing oil palm trees and the number of missing trees together with its individual coordinates can be obtained using this graphical interface.…”
    Get full text
    Get full text
    Thesis