Search Results - (( java implementation level algorithm ) OR ( parameter distribution practices algorithm ))
Search alternatives:
- parameter distribution »
- distribution practices »
- implementation level »
- java implementation »
- level algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
4
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
5
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
6
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
8
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
9
Abnormalities and fraud electric meter detection using hybrid support vector machine & genetic algorithm
Published 2023“…SVM is a classification technique developed by Vapnik [1] but a practical difficulty of using SVM is the selection of parameters such as C and kernel parameter, � in Gaussian RBF kernel. …”
Conference Paper -
10
-
11
Optimal Location And Sizing Of Distrubuted Generator Using PSO And GA Algorithms In Power Systems
Published 2019“…This research aimed to reduce total power losses and improve voltage profiles of the distribution system by proposing a practical swarm optimizion algorithm GA genetic algorithm to optimize DG size and location by taking into consideration increase number of DG units in the system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Parameter estimation of K-distributed sea clutter based on fuzzy inference and Gustafson-Kessel clustering
Published 2011“…This paper proposes a novel approach to estimate the parameters of K-distribution, based on fuzzy Gustafson–Kessel clustering and fuzzy Takagi–Sugeno Kang modelling. …”
Get full text
Get full text
Article -
13
A Bayesian parameter learning procedure for nonlinear dynamical systems via the ensemble Kalman filter
Published 2018“…Within the parameter learning steps, the MCMC algorithm requires to perform state estimation for which the target distribution is constructed by using the Ensemble Kalman filter (EnKF). …”
Get full text
Get full text
Article -
14
Enhancing harmony search parameters based on step and linear function for bus driver scheduling and rostering problems
Published 2018“…Optimization is a major challenge in numerous practical world problems.According to the “No Free Lunch (NFL)” theorem,there is no existing single optimizer algorithm that is able to resolve all issues in an effective and efficient manner.It is varied and need to be solved according to the specific capabilities inherent to certain algorithms making it hard to foresee the algorithm that is best suited for each problem.As a result,the heuristic technique is adopted for this research as it has been identified as a potentially suitable algorithm.Alternative heuristic algorithms are also suggested to obtain optimal solutions with reasonable computational effort.However,the heuristic approach failed to produce a solution that nears optimum when the complexity of a problem increases;therefore a type of nature-inspired algorithm known as meta-euristics which utilises an intelligent searching mechanism over a population is considered and consequently used.The meta-heuristic approach is widely used to substitute heuristic terms and is broadly applied to address problems with regards to driver scheduling.However,this meta-heuristic technique is still unable to address the fairness issue in the scheduling and rostering problems.Hence,this research proposes a strategy to adopt an amendment of the harmony search algorithm in order to address the fairness issue which in turn will escalate the level of fairness in driver scheduling and rostering.The harmony search algorithm is classified as a meta-heuristics algorithm that is capable of solving hard and combinatorial or discrete optimisation problems.In this respect,the three main operators in harmony search,namely the Harmony Memory Consideration Rate (HMCR),Pitch Adjustment Rate (PAR) and Bandwidth (BW) play a vital role in balancing local exploitation and global exploration.These parameters influence the overall performance of the HS algorithm,and therefore it is crucial to fine-tune them. …”
Get full text
Get full text
Get full text
Thesis -
15
Firefly analytical hierarchy algorithm for optimal allocation and sizing of distributed generation in radial distribution network
Published 2022“…Practically, this FAHA has great potential applications for the optimal allocation and sizing of DG in the radial distribution network.…”
Get full text
Get full text
Get full text
Thesis -
16
Secure E-Voting With Blind Signature
Published 2003“…In this system, voter’s privacy is guaranteed by using a blind signature for confidentiality and voter’s digital signature for voter’s authentication. E-Voting is implemented by employing Java socket technology and BouncyCastle cryptography provider. …”
Get full text
Get full text
Conference or Workshop Item -
17
Variational Bayesian inference for exponentiated Weibull right censored survival data
Published 2023“…It also has the strength of adapting unimodal functions with bathtub shape. Estimating the parameter of EWD distribution poses another problem as the flexibility calls for the introduction of an additional parameter. …”
Get full text
Get full text
Get full text
Article -
18
Transformer T-joint optimization using particle swarm optimization and hemisphere-shape design of the core
Published 2017“…Moreover, the proposed intelligent algorithm in this work can improve the transformer core design as well as can be applied to various power and distribution transformers.…”
Get full text
Get full text
Thesis -
19
Development of integrated models for distribution network design of perishable products
Published 2015“…A Lagrangian relaxationbased heuristic algorithm is developed to solve the model. The algorithm produces solutions that are within 0.027% of optimality gap.…”
Get full text
Get full text
Thesis -
20
Autonomous flight algorithm of a quadcopter sensing system for methane gas concentration measurements at landfill site
Published 2018“…During the tests the weather conditions were fine and acceptable to carry out the experiments These parameters were also selected based on the practical verification experiments. …”
Get full text
Get full text
Thesis
