Search Results - (( java implementation level algorithm ) OR ( pattern computationally efficient algorithm ))
Search alternatives:
- implementation level »
- java implementation »
- level algorithm »
- computationally »
- efficient »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
DFP-growth: An efficient algorithm for mining frequent patterns in dynamic database
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
3
ELP-M2: An Efficient Model for Mining Least Patterns from Data Repository
Published 2017“…Therefore, in this paper we proposed a complete model for mining least patterns known as Efficient Least Pattern Mining Model (ELP-M2) with LP-Tree data structure and LP-Growth algorithm. …”
Get full text
Get full text
Get full text
Get full text
Book Chapter -
4
An Efficient Data Structure for General Tree-Like Framework in Mining Sequential Patterns Using MEMISP
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
6
A new split based searching for exact pattern matching for natural texts
Published 2018Get full text
Get full text
Article -
7
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
8
-
9
Algorithms for frequent itemset mining: a literature review
Published 2018“…This paper reviews and presents a comparison of different algorithms for Frequent Pattern Mining (FPM) so that a more efficient FPM algorithm can be developed. …”
Get full text
Get full text
Article -
10
Fast directional search algorithm for fractional pixel motion estimation for H.264 AVC
Published 2013“…The proposed search pattern and early termination reduce computational time by almost 8% to 18% as compared to the hierarchical fractional pixel algorithm employed in the reference software with a negligible degradation in video quality and negligible increase in bit rate.…”
Get full text
Get full text
Citation Index Journal -
11
Fast discovery of long patterns for association rules
Published 2003“…An algorithm called Flex for identifying frequent patterns especially efficient when the patterns are long is proposed by successive construction of the nodes lexicographic tree. …”
Get full text
Get full text
Article -
12
EFP-M2: Efficient model for mining frequent patterns in transactional database
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Performance of IF-Postdiffset and R-Eclat Variants in Large Dataset
Published 2018Get full text
Get full text
Article -
15
Block matching algorithms for motion estimation using modified Cross-Diamond-Hexagonal search / Abd Razak Mahmud
Published 2008“…This algorithm basically employs two crossshaped search patterns consecutively in the very beginning steps and switch using diamond-shaped patterns. …”
Get full text
Get full text
Thesis -
16
Neural Network Training Using Hybrid Particle-move Artificial Bee Colony Algorithm for Pattern Classification
Published 2017“…In this work, we aimed to highlight the performance of the Hybrid Particle-move Artificial Bee Colony (HPABC) algorithm by applying it on the ANNT application. The performance of the HPABC algorithm was investigated on four benchmark pattern-classification datasets and the results were compared with other algorithms. …”
Get full text
Get full text
Get full text
Article -
17
Hilbert-peano and zigzag: Two approaches mapping pattern of digital watermarking for text images authentication
Published 2021Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
19
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
20
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article
