Search Results - (( java implementation level algorithm ) OR ( parameter reduction factor algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal
  6. 6

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    The PID controller parameter tuning based on a modified differential evolutionary optimization algorithm for the intelligent active vibration control of a combined single link robo... by Moloody, Abbas, As’arry, Azizan, Hong, Tang Sai, Raja Kamil, ., Zolfagharian, Ali

    Published 2025
    “…The Crossover Probability Factor (CPF) as the Certain Ratio (CR) and the Mutation Factor (MF) of the algorithm are gradually altered during algorithm iteration to enhance the method's performance during optimization. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Combined modal parameters-based index for damage identification in a beamlike structure: theoretical development and verification by Fayyadh, M.M., Razak, H.A., Ismail, Z.

    Published 2011
    “…The new index called Combined Parameter Index (CPI) compares the factor of reduction in stiffness according to reduction in natural frequencies and also the factor of reduction in stiffness according to change in mode shape. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Enhancing Harmony Search Metaheuristic Algorithm for Coverage Efficiency, Test Suite Reduction, and Running Time in Combinatorial Interaction Testing by Muazu, Aminu Aminu, Hashim, Ahmad Sobri

    Published 2025
    “…Despite HS’s tendency to get stuck in local optima, we dynamically adjust its parameter values in our proposed eHS. The experimental results demonstrate that eHS outperforms the other algorithms for CIT in terms of coverage efficiency and test suite reduction. …”
    Get full text
    Get full text
    Article
  13. 13

    Development of a phantom and metal artifact correction (MAC) algorithm for post-operative spine computed tomography (CT) imaging / Noor Diyana Osman by Osman, Noor Diyana

    Published 2014
    “…The last part is the development of a metal artifact correction (MAC) algorithm and evaluation of the proposed algorithm in artifacts reduction in CT images. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Efficient hybrid reduction for binary based information system in soft set theory by Mohd Rose, Ahmad Nazari

    Published 2016
    “…HRSS consists of two(2) types of parameter reduction and a newly proposed object reduction. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    PSO and Linear LS for parameter estimation of NARMAX/NARMA/NARX models for non-linear data / Siti Muniroh Abdullah by Abdullah, Siti Muniroh

    Published 2017
    “…Results suggest that the PSO algorithm is viable alternative to other established algorithms for LLS parameter estimation. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Modeling And Optimization Of Physical Vapour Deposition Coating Process Parameters For Tin Grain Size Using Combined Genetic Algorithms With Response Surface Methodology by Mohamad Jaya, Abdul Syukor, Muhamad, Mohd Razali, Abd Rahman, Md Nizam, Mohammad Jarrah, Mu'ath Ibrahim, Hasan Basari, Abd Samad

    Published 2015
    “…Additionally,analysis of variance(ANOVA) was used to determine the significant factors influencing resultant TiN coating grain size.Based on that,a quadratic polynomial model equation was developed to represent the process variables and coating grain size.Then,in order to optimize the coating process parameters, genetic algorithms (GAs) were combined with the RSM quadratic model and used for optimization work.Finally,the models were validated using actual testing data to measure model performances in terms of residual error and prediction interval (PI).The result indicated that for RSM,the actual coating grain size of validation runs data fell within the 95% (PI) and the residual errors were less than 10 nm with very low values, the prediction accuracy of the model is 96.09%.In terms of optimization and reduction the experimental data,GAs could get the best lowest value for grain size then RSM with reduction ratio of ≈6%, ≈5%, respectively.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Classification of basal stem rot disease in oil palm using dielectric spectroscopy by Al-Khaled, Al-Fadhl Yahya Khaled

    Published 2018
    “…An analysis was done to see the effect of implementing different data reduction algorithms in classifying BSR disease. The results showed that the impedance parameter was the best in classifying BSR severity levels compared to the other dielectric properties. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Improved dung beetle optimization algorithm and finite element analysis for spindle optimization by Haohao, Ma, As’arry, Azizan, Xuping, Wu, Ismail, Mohd Idris Shah, Ramli, Hafiz Rashidi, Saad, Mohd Sazli, Delgoshaei, Aidin

    Published 2024
    “…The obtained optimal parameters guide the construction of a finite element model, considering additional factors like stiffness and maximum stress. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Optimization of super twisting sliding mode control gains using Taguchi method by Jamaludin, Zamberi, Chiew, Tsung Heng, Bani Hashim, Ahmad Yusairi, Rafan, Nur Aidawaty, Abdullah, Lokman

    Published 2018
    “…Optimized algorithm achieved 9.3% of reduction in root mean square of tracking error and 38.4% of reduction in chattering experimentally.…”
    Get full text
    Get full text
    Get full text
    Article