Search Results - (( java implementation level algorithm ) OR ( network implementation software algorithm ))
Search alternatives:
- implementation software »
- network implementation »
- implementation level »
- java implementation »
- software algorithm »
- level algorithm »
-
1
Network monopoly / Tan Kean Yeap
Published 2002“…The main aspect of this thesis is to produce a network monopoly system, which process multiple game sessions concurrently, enabling users to play the graphical game with people within the network. The algorithm design and implementation method mustnot only be workable, but also highly efficient in terms of execution speed and respond time. …”
Get full text
Get full text
Thesis -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
3
Cohesive token passing algorithm utilizing software agents
Published 2010“…This encompasses the implementation in the area of Wave Division Multiplexing (WDM) networks and Mobile Adhoc Networks (MANET). …”
Get full text
Get full text
Article -
4
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis -
5
Security mechanism for wireless Mobile Ad Hoc Networks (MANET)
Published 2006“…The One Time Pad algorithm and Caesar Cipher algorithms are implemented using LabVIEW software. …”
Get full text
Get full text
Student Project -
6
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
7
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019“…It is implemented using Verilog HDL software and simulated using the ModelSim software. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
8
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
9
Fiber-Wireless testbed using software defined radio for protocol and algorithm testing
Published 2023“…The results show that algorithms implemented in the testbed are in-line with the expected results. …”
Article -
10
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. The algorithm was written in Python programming language to be implementing on a POX controller. …”
Get full text
Get full text
Thesis -
11
Implementing artificial neural networks and genetic algorithms to solve modeling and optimisation of biogas production
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Training functional link neural network with ant lion optimizer
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…In this study we compare the time complexity and power consumption between software and hardware implementation using RSA algorithm. …”
Get full text
Get full text
Proceeding Paper -
14
Letter recognition using backpropagation algorithm
Published 2010“…The objective of tbi project is to implement Backpropagation Neural Network for letter recognition task. …”
Get full text
Get full text
Undergraduates Project Papers -
15
-
16
Multi-Backpropagation network
Published 2002“…The learning mechanism for Neural Network is its learning algorithm. Backpropagation (or backprop) algorithm is one of the well-known algorithms in neural networks. …”
Get full text
Get full text
Conference or Workshop Item -
17
-
18
Implementing artificial neural networks and genetic algorithms to solve modeling and optimisation of blogas production
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation
Published 2000“…For the implementation aspect, software-driven media processing was studied. …”
Get full text
Get full text
Thesis -
20
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis
