Search Results - (( java implementation level algorithm ) OR ( pattern simulation modified algorithm ))
Search alternatives:
- implementation level »
- java implementation »
- simulation modified »
- level algorithm »
-
1
New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique
Published 2016“…There are 6 main designs that the algorithms proposed namely the Orthogonal-Diamond Search Algorithm with Small Diamond Search Pattern (ODS-SDSP), the Orthogonal-Diamond Search Algorithm with Large Diamond Search Pattern (ODS-LDSP), the Diamond-Orthogonal Search Algorithm with Small Diamond Pattern (DOS-SDSP), the Diamond-Orthogonal Search Algorithm with Large Diamond Pattern (DOS-LDSP), the Modified Diamond-Orthogonal Search Algorithm with Small Diamond Pattern (MDOS-SDSP), and the Modified Diamond-Orthogonal Search Algorithm with Large Diamond Pattern (MDOS-LDSP). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
3
Adaptive beamforming algorithm based on Simulated Kalman Filter
Published 2017“…Some of the metaheuristic algorithms have been modified from the original algorithms to improve the algorithms performance in adaptive beamforming application. …”
Get full text
Get full text
Thesis -
4
Optimized clustering with modified K-means algorithm
Published 2021“…Testing on real data sets showed consistency results as the simulated ones. Generally, the proposed modified k-means algorithm is able to determine the optimum number of clusters for huge data.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Hybrid meta-heuristic algorithm for solving multi-objective aggregate production planning in fuzzy environment
Published 2017“…During the course of the present work, two fuzzy methods (modified Zimmermanns approach and modified angelovs approach ) and fourmeta-heuristics and hybrid meta heuristics including; simulated annealing (SA), modified simulated annealing (MSA), hybrid modified simulated annealing and simplex downhill (MSASD), hybrid modified simulated annealing and modified particle swarm optimization (MSAPSO) were proposed. …”
Get full text
Get full text
Thesis -
7
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
8
A proposed framework for fish behaviors based on boid simulator
Published 2016“…This paper proposed a framework to simulate school of fishes of heterogeneous behaviours using the modified classical boid algorithm.The keystone of this paper is to allow flexible adaptations by two-level approaches where autonomous agent can instantly changes its micro- and macro behaviours through the parameter alteration.This study focuses on the genus Cyprinus (fish) that have distinguished varieties such as color, pattern and scale.This type of fish is well suited for computational simulation as individual fish can be easily tracked due to its discrete characters. …”
Get full text
Get full text
Conference or Workshop Item -
9
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
10
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
11
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
12
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
13
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
14
The effect of adaptive parameters on the performance of back propagation
Published 2012“…The results show that the proposed algorithm extensively improves the learning process of conventional Back Propagation algorithm.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control
Published 2020“…Addition of hybrid automata algorithm to run pattern and non-pattern recognition based control methods is an advantage to increase accuracy in differentiating forward stroke or hand return activity. …”
Get full text
Get full text
Thesis -
16
Solar photovoltaic system based on perturb and observe maximum power point tracking with trapezoidal rule approach under partial shading conditions
Published 2022“…The second is to propose a hybrid MPPT algorithm based on modified P&O algorithm assisted by Extremum Seeking Control (ESC) approach, in order to maximize the extracted PV power under complex PSC. …”
Get full text
Get full text
Get full text
Thesis -
17
An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization
Published 2019“…By considering the ASVs as swarm robotics testing platforms, each algorithm is evaluated and benchmarked against several existing algorithms through simulation studies. …”
Get full text
Get full text
Thesis -
18
Effect of chaos noise on the learning ability of back propagation algorithm in feed forward neural network
Published 2010Get full text
Working Paper -
19
Ultra-wide band antipodal Vivaldi antenna design using target detection algorithm for detection application
Published 2023“…A signal processing technique have been employed to improve the resolution of the target image. Using computer simulation technology (CST) software, the development and optimization process of an antenna is carried out, and the parametric performance of return loss, directivity and radiation pattern is evaluated.…”
Get full text
Get full text
Get full text
Article -
20
Ultra-wide band antipodal Vivaldi antenna design using target detection algorithm for detection application
Published 2023“…A signal processing technique have been employed to improve the resolution of the target image. Using computer simulation technology (CST) software, the development and optimization process of an antenna is carried out, and the parametric performance of return loss, directivity and radiation pattern is evaluated.…”
Get full text
Get full text
Get full text
Article
