Search Results - (( java implementation level algorithm ) OR ( pattern evolution optimization algorithm ))

Refine Results
  1. 1
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    Efficient radio resource management algorithms for downlink long term evolution networks by Mamman, Maharazu

    Published 2018
    “…The algorithm is based on the idea of the optimization problem in which resource allocation problem is formulated as an optimization problem. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A novel Master–Slave optimization algorithm for generating an optimal release policy in case of reservoir operation by Turgut, Mert Sinan, Turgut, Oguz Emrah, Afan, Haitham Abdulmohsin, El-Shafie, Ahmed

    Published 2019
    “…First, three different optimization algorithms, namely particle swarm optimization, differential evolution, and whale optimization algorithm, have been applied. …”
    Get full text
    Get full text
    Article
  6. 6

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A filtering algorithm for efficient retrieving of DNA sequence by Abdul Rahman, Mohd Nordin, Mohd. Saman, Md. Yazid, Ahmad, Aziz, Md. Tap, Abu Osman

    Published 2009
    “…The biologists frequently demand for optimal comparison result so that the perfect structure of living beings evolution can be constructed. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal
  10. 10

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Multi-area economic dispatch by using differential evolution immunized ant colony optimization (DEIANT) by Marzuki N.H., Rahmat N.A., Mat Salleh J., Otoh O.F.

    Published 2023
    “…Each region has a specific cost and load pattern. Tie-lines are used as connectors to enable power switching between regions. 31-Bus test system tested using an algorithm known as Differential Evolution Immunized Ant Colony Optimization (DEIANT) with different case studies with several trials taken to assess the consistency of results. …”
    Article
  12. 12

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Design Of Feature Selection Methods For Hand Movement Classification Based On Electromyography Signals by Too, Jing Wei

    Published 2020
    “…The third method is the hybridization of BPSO and Binary Differential Evolution, namely Binary Particle Swarm Optimization Differential Evolution (BPSODE). …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Reservoir system modelling using nondominated sorting genetic algorithm in the framework of climate change by Nurul Nadrah Aqilah, Tukimat

    Published 2014
    “…In conclusion, this finding contributes toward the development of models using evolution algorithm and statistical methods for sustainable water resources planning and management in the context of future climate change…”
    Get full text
    Get full text
    Thesis
  16. 16

    Genetic ensemble biased ARTMAP method of ECG-Based emotion classification by Loo, C.K., Liew, W.S., Sayeed, M.S.

    Published 2012
    “…The optimal combination of λ and training sequence can be computed efficiently using a genetic permutation algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Comparative study on the reservoir operation planning with the climate change adaptation by Nurul Nadrah Aqilah, Tukimat, Sobri, Harun

    Published 2019
    “…The non-dominated sorting genetic algorithm version II (NSGA-II) was applied in both analyses to optimize the water use due to the multi-objectives demand, maximizing water release, minimizing water shortage and maximizing reservoir storage. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Comparative study on the reservoir operation planning with the climate change adaptation by Nurul Nadrah Aqilah, Tukimat, Sobri, Harun

    Published 2019
    “…The non-dominated sorting genetic algorithm version II (NSGA-II) was applied in both analyses to optimize the water use due to the multi-objectives demand, maximizing water release, minimizing water shortage and maximizing reservoir storage. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Chiller power consumption forecasting for commercial building based on hybrid convolution neural networks-long short-term memory model with barnacles mating optimizer by Mohd Herwan, Sulaiman, Zuriani, Mustaffa

    Published 2025
    “…The study compares the proposed CNN-LSTM-BMO against other metaheuristic optimization algorithms, including Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), and Differential Evolution (DE). …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network by Sama, Najm Us

    Published 2019
    “…In the proposed work, the focused problem is how to reduce the communication energy consumption and to avoid the routing hole problem by optimized routing algorithms. First, a routing hole detection algorithm is proposed prior to designing the routing protocol which decreases about 30 percent energy consumption rate, detection time and detection overhead. …”
    Get full text
    Get full text
    Thesis