Search Results - (( java implementation level algorithm ) OR ( pattern identification using algorithm ))
Search alternatives:
- pattern identification »
- implementation level »
- identification using »
- java implementation »
- level algorithm »
- using algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
4
Linear-PSO with binary search algorithm for DNA Motif Discovery / Hazaruddin Harun
Published 2015“…At present, DNA sequencing analysis is the most utilised technique for species identification where patterns of DNA sequences are determined by comparing the sequence to comprehensive databases. …”
Get full text
Get full text
Book Section -
5
Animal voice recognition for identification (ID) detection system
Published 2011“…While the voice pattern classification will be done by using DTW algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
6
Dog voice identification (ID) for detection system
Published 2012“…While the voice pattern classification will be done by using DTW algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
7
Acoustic echo cancellation using adaptive filtering algorithms for quranic accents (Qiraat) identification
Published 2015“…Based on our experimental results, the AP algorithm achieved 93.9 % accuracy rate against all pattern classification techniques including PPCA, KNN, and GMM. …”
Get full text
Get full text
Get full text
Article -
8
The Effect Of Linkages In The Hierarchical Clustering Of Auto-Regressive Algorithm For Defect Identification In Heat Exchanger Tubes
Published 2019“…The pattern recognition approach using ‘ward’ linkages in AR algorithm has been shown to effectively identify the defects in the heat exchanger tubes.…”
Get full text
Get full text
Get full text
Article -
9
Linear-pso with binary search algorithm for DNA motif discovery / Hazaruddin Harun
Published 2015“…Another five species were used for Motif Identification, which were human, sheep, dog, frog, and rat. …”
Get full text
Get full text
Thesis -
10
High impedance fault detection and identification based on pattern recognition of phase displacement computation
Published 2018“…There are two stages in this algorithm. In the first stage, the pattern of the PDC is analyzed to detect the occurrence of an event. …”
Get full text
Get full text
Article -
11
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
12
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
13
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Design of intelligent Qira’at identification algorithm
Published 2017“…To evaluate the algorithm, 350 samples for 10 types of Qira’at recitation are in used, and for justifying the best pattern classification, few algorithms are tested in the early preliminary evaluation with K-Nearest Neighbour, GMM and PPCA. …”
Get full text
Get full text
Thesis -
15
MINING CUSTOMER DATA FOR DECISION MAKING USING NEW HYBRID CLASSIFICATION ALGORITHM
Published 2011“…The experimental result shows that the proposed hybrid k-mean plus MFP algorithm can generate more useful pattern from large stock data.…”
Get full text
Get full text
Citation Index Journal -
16
EEG EYE STATE IDENTIFICATION BASED ON STATISTICAL FEATURES AND COMMON SPATIAL PATTERN
Published 2019“…Hence, the proposed work aimed to analyse the EEG eye state signal as well as develop an algorithm using statistical-CSP features on the eye state identification.…”
Get full text
Get full text
Final Year Project -
17
MINING CUSTOMER DATA FOR DECISION MAKING USING NEW HYBRID CLASSIFICATION ALGORITHM
Published 2011“…The experimental result shows that the proposed hybrid k-mean plus MFP algorithm can generate more useful pattern from large stock data.…”
Get full text
Get full text
Citation Index Journal -
18
Frequent patterns minning of stock data using hybrid clustering association algorithm
Published 2009“…The experimental result shows that the proposed hybrid k-mean plus MFP algorithm can generate more useful pattern from large stock data. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
20
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item
