Search Results - (( java implementation level algorithm ) OR ( parameter relation based algorithm ))
Search alternatives:
- implementation level »
- java implementation »
- parameter relation »
- level algorithm »
- relation based »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
4
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
5
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
6
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
8
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
9
A novel normal parameter reduction algorithm of soft sets
Published 2010“…The comparison result on a Boolean-valued dataset shows that, the proposed algorithm involves relatively less computation and is easier to implement and understand as compared with the soft set-based algorithm of normal parameter reduction.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Taguchi-Grey Relational Analysis Method for Parameter Tuning of Multi-objective Pareto Ant Colony System Algorithm
Published 2023“…For optimal maintenance scheduling with low cost, high reliability, and low violation, the parameter values of the PACS algorithm were tuned using the Taguchi and Gray Relational Analysis (Taguchi-GRA) method through search-based approach. …”
Get full text
Get full text
Get full text
Article -
11
An alternative approach to normal parameter reduction algorithms for decision making using a soft set theory / Sani Danjuma
Published 2017“…In addition, the algorithm was relatively easy to understand compare to the state of the art of normal parameter reduction algorithm. …”
Get full text
Get full text
Get full text
Thesis -
12
Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh
Published 2015“…ARDE algorithm makes use of JADE strategy and the MDE_pBX parameters adaptive schemes as frameworks. …”
Get full text
Get full text
Thesis -
13
New Parameter Reduction of Soft Sets
Published 2012“…However, the algorithm involves a great amount of computation. In this thesis, a New Efficient Normal Parameter Reduction algorithm (NENPR) of soft sets is proposed based on the new theorems, which have been proved and presented. …”
Get full text
Get full text
Thesis -
14
Predictive analytics of Junctionless Double Gate Strained MOSFET using genetic algorithm with doe-based grey relational analysis
Published 2023“…This paper explores the application of Genetic Algorithm (GA) incorporated with design of experiment (DoE) based on Grey Relational Analysis (GRA) in predicting the optimal design parameters of n-type Junctionless Double Gate Strained MOSFET (JLDGSM). …”
Get full text
Get full text
Get full text
Article -
15
Mixed-variable ant colony optimisation algorithm for feature subset selection and tuning support vector machine parameter
Published 2017“…ACOMV-SVM algorithm is able to simultaneously tune SVM parameters and feature subset selection. …”
Get full text
Get full text
Article -
16
Input-output based relation combinatorial testing using whale optimization algorithm for generating near optimum number of test suite
Published 2025“…Given the impracticality of testing every possible interaction due to time, budget, and resource constraints, combinatorial testing, which is t-way testing, is adopted to cover parameter interactions efficiently. This research focuses on the Input-Output Based Relations (IOR) testing strategy, which optimizes the test suite size by selecting critical parameters and employing “don’t care” values for non-essential inputs. …”
Get full text
Get full text
Get full text
Article -
17
Optimization of milling parameters using ant colony optimization
Published 2008“…The simulation based on ACO algorithm are successful develop and the optimization of parameters values is to maximize the production rate is obtain from the simulation.…”
Get full text
Get full text
Undergraduates Project Papers -
18
CTJ: Input-output based relation combinatorial testing strategy using Jaya algorithm
Published 2019“…Combinatorial testing is the way to encounter exhaustive testing through the testing of every input values and every combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
19
Relative motion guidance, navigation and control for autonomous spacecraft rendezvous
Published 2011“…The corresponding measurement models, process noise matrix and other filter parameters are provided. The guidance and control algorithms are based on the glideslope used in the past for rendezvous and proximity operations of the Space Shuttle with other vehicles. …”
Get full text
Get full text
Get full text
Proceeding Paper -
20
Multi-objective pareto ant colony system based algorithm for generator maintenance scheduling
Published 2022“…The Taguchi and Grey Relational Analysis methods are proposed to tune the PACS’s parameters. …”
Get full text
Get full text
Get full text
Thesis
