Search Results - (( java implementation level algorithm ) OR ( parameters variation sensor algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Sensorless Adaptive Fuzzy Logic Control Of Permanent Magnet Synchronous Motor by Hafz Nour, Mutasim Ibrahim

    Published 2008
    “…However, these controllers are very sensitive to step change of command speed, parameter variations and load disturbance. In this work, an adaptive fuzzy logic speed controller is proposed. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Sensor-less vector control using adaptive observer scheme for controlling the performance of the induction motor / Mazhar Hussain Abbasi by Mazhar, Hussain Abbasi

    Published 2013
    “…Internal parameters are used, for example, feed-forward compensator of current controller and parameters of observer model in sensor less position. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal
  8. 8

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Mathematical modeling for SnO2 gas sensor based on second-order response by Moshayedi, Ata Jahangir, Toudeshki, Arash Mohammadi, Gharpure, Dayamanti C.

    Published 2013
    “…The data analysis has been done with Matlab software, and Genetic algorithm is further used to optimize the transfer function parameters. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Development an accurate and stable range-free localization scheme for anisotropic wireless sensor networks by Han, Fengrong

    Published 2022
    “…This study developed an optimized variation of the DV-Hop localization algorithm for anisotropic wireless sensor networks. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Class binarization with self-adaptive algorithm to improve human activity recognition by Zainudin, Muhammad Noorazlan Shah

    Published 2018
    “…In order to estimate the quality of ‘pruned’ features, self-adaptive DE algorithm is proposed. Two parameters (population size and generation numbers) are adaptively adopted from number of remaining ranking features. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Faulty sensor detection using data correlation of multivariant sensor reading in smart agriculture with IOT by Malik, Ahmed Dhahir

    Published 2019
    “…This method will be applied to the smart agriculture which uses multi-variate sensors such as moisture sensor, temperature sensor and water sensor in IoT. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Analysis of robot localisation performance based on extended kalman filter by Che Hassan, Farah Hazwani

    Published 2015
    “…A most current localisation algorithm has less flexibility and autonomy because it depends on human to determine what aspects of the sensor data to use in localisation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Comparison study of maximum power point tracker techniques for PV systems by Zainudin, H.N., Mekhilef, S.

    Published 2010
    “…This paper presents in details comparative study between two most popular algorithms technique which is incremental conductance algorithm and perturb and observe algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Model-based hybrid variational level set method applied to object detection in grey scale images by Wang, Jing

    Published 2024
    “…This algorithm leverages an improved multi-scale mean filter to mitigate grayscale inhomogeneity while reducing the impact of scale parameter selection. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Fuzzy control algorithm for educational light tracking system by Abdul Kareem, Samir A., Muhida, Rizah, Akmeliawati, Rini

    Published 2010
    “…The fuzzy controller input parameters (light source pixel coordinate) and output parameters (variation of duty cycle) are used to generate the optimal pulse-width modulated (PWM) under different operating conditions to drive the motors. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    A hybrid sampling-based path planning algorithm for mobile robot navigation in unknown environments by Khaksar, Weria

    Published 2013
    “…Afterward, a genetic algorithm-based optimization framework was designed to improve the interpretability and accuracy of the proposed fuzzy-tabu controller by optimizing the parameters of the FLC and also some of the planner’s parameters in order to improve the quality of the generated paths and runtimes of the planner and also to decrease the variation of the results in different runs of the planner. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Energy efficient path reconstruction in wireless sensor network using iPath by Hasan, Sazlinah, Abd, Wamidh Jwdat, Ariffin, Ahmad Alauddin

    Published 2019
    “…Wireless sensor networks operate through commonly self-organized sensor nodes to transfer data in a multi-hop approach to a central sink. …”
    Get full text
    Get full text
    Get full text
    Article