Search Results - (( java implementation level algorithm ) OR ( network implementation case algorithm ))
Search alternatives:
- network implementation »
- implementation level »
- java implementation »
- implementation case »
- level algorithm »
- case algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
A study of fluctuations and confidence of implementation in genetic algorithm optimized network in data centre
Published 2018“…The reliability of genetic algorithm may vary based on implementation case, hence it is necessary to investigate its performance pattern for each implementation case. …”
Get full text
Get full text
Article -
3
A study of fluctuations and confidence of implementation in genetic algorithm optimized network in data centre
Published 2018“…The reliability of genetic algorithm may vary based on implementation case, hence it is necessary to investigate its performance pattern for each implementation case. …”
Get full text
Get full text
Article -
4
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
5
A study of fluctuations in genetic algorithm optimized network in data centre
Published 2017“…The reliability of genetic algorithm may vary based on implementation case, hence it is necessary to investigate its performance pattern for each implementation case. …”
Get full text
Get full text
Article -
6
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
7
Optimal location and size estimation of distributed generators by employing grouping particle swarm optimization and grouping genetic algorithm
Published 2017“…Distributed Generators is being implemented in the distribution network to improve the performance of the network by reducing the real and reactive power losses, while improving voltage profile during the operation. …”
Get full text
Get full text
Thesis -
8
Application of artificial neural network genetic algorithm in inferential estimation and control of a distillation column
Published 2005“…Comparisons were also made to the feedforward network model trained using Levenberg-Marquardt (LM) training algorithm as well as Elman network. …”
Get full text
Get full text
Thesis -
9
-
10
Implementation of an inverse-model-based control strategy using neural networks on a partially simulated exothermic reactor
Published 2000“…This paper describes a novel implementation of a neural network inverse-model based control method on a experimental system-a partially simulated reactor, designed to test the use of such non-linear algorithms. …”
Get full text
Get full text
Article -
11
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
12
Traffic management algorithms for LEO satellite networks
Published 2016“…In order to evaluate the proposed algorithm, a series of experiments to implement Discrete Event Simulation (DES) of a LEO satellite network by using ns-2 and C/C++ are conducted. …”
Get full text
Get full text
Get full text
Thesis -
13
A case study on quality of sleep and health using Bayesian networks
Published 2012“…The network scores computation is implemented to estimate the fitting of the resulting network of each structural learning algorithm in order to choose the best-fitted network. …”
Get full text
Article -
14
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
15
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
16
Workability review of genetic algorithm approach in networks
Published 2014“…In this paper, we surveyed the implementations of genetic algorithm within networks, whether it is computer network, transportation network, and other fields that have networking context. …”
Get full text
Get full text
Conference or Workshop Item -
17
Reverse logistics network optimizing by genetic algorithm: a case study of automotive wiring harnesses
Published 2014“…With regards to the complexity of the reverse logistics network, traditional method cannot be implemented for solving them. …”
Get full text
Get full text
Get full text
Article -
18
-
19
An integrated algorithm of analytical network process with case-based reasoning to support the selection of an ideal football team formation and players
Published 2021“…A new combined decision model which integrates Analytical Network Process and Case-based Reasoning was developed. …”
Get full text
Get full text
Get full text
Thesis -
20
Web Algorithm search engine based network modelling of Malaria Transmission
Published 2013“…The Hypertext Induced Topical Search (HITS) web search algorithm was adapted to implement a search engine, which uses the bipartite contact network as the input. …”
Get full text
Get full text
Get full text
Thesis
