Search Results - (( java implementation level algorithm ) OR ( program point based algorithm ))
Search alternatives:
- implementation level »
- java implementation »
- level algorithm »
- program point »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
4
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
5
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
6
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
7
A Program To Generalize Contour Lines
Published 1994“…A complete computer program based on the developed algorithm is presented.…”
Get full text
Get full text
Article -
8
Continuation power flow for voltage stability assessment / Mohd Zamri Laton
Published 2006“…The continuation power flow program is developed using MATLAB programming language base on algorithm of continuation power flow (CPF) technique, which can compute efficiently the parameter at saddle node bifurcation point. …”
Get full text
Get full text
Thesis -
9
Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat
Published 2008“…This thesis presents the Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission system. …”
Get full text
Get full text
Thesis -
10
Implementation of Autonomous Vehicle Navigation Algorithms Using Event-Driven Programming
Published 2012“…By using FSM to describe the behaviour of a navigating mobile robot, an equivalent algorithm can be developed. The algorithm can be relatively easy translated to a suitable program with event-driven programming technique. …”
Get full text
Get full text
Conference or Workshop Item -
11
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
12
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
13
Implementation of autonomous vehicle navigation algorithms using event-driven programming
Published 2012“…By using FSM to describe the behaviour of a navigating mobile robot, an equivalent algorithm can be developed. The algorithm can be relatively easy translated to a suitable program with event-driven programming technique. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
An alternative method to solve combined economic emission dispatch problems using flower pollination algorithm
Published 2016“…Flower Pollination Algorithm (FPA) is a new biologically inspired meta-heuristic optimization technique based the pollination process of flowers. …”
Get full text
Get full text
Thesis -
15
A review of slicing techniques in software engineering
Published 2015“…Program slice is the part of program that may take the program off the path of the desired output at some point of its execution. …”
Get full text
Get full text
Get full text
Proceeding Paper -
16
Breaking A Playfair Cipher Using Single and Multipoints Crossover Based on Heuristic Algorithms
Published 2023Conference Paper -
17
A combined filter line search and trust region method for nonlinear programming
Published 2006“…In the event when the step size has reached a minimum threshold such that the trial iterate is rejected by the filter, the algorithm temporarily exits to a trust region based algorithm to generate iterates that approach the feasible region and also acceptable to the filter. …”
Get full text
Article -
18
Peripheral Interface Controller (PIC) Based Maximum Power Point Tracking (MPPT) Algorithm For Photovoltaic (PV) DC To DC Boost Converter
Published 2016“…Every photovoltaic (PV) array has an optimum operating point, called the maximum power point, which varies depending on PV temperature, the insolation level and array voltage. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
An Improved of Channel Allocation for WLAN Using Vertex Merge Algorithm
Published 2012“…Through this algorithm, each access point (AP) that adjacent will be given different channels based on colours available. …”
Get full text
Get full text
Conference or Workshop Item -
20
One-step block methods for solving ordinary and delay differential equations
Published 2011“…The algorithm which is based on the predictor-corrector scheme of Adams type was then extended from two up to six point one step block method. …”
Get full text
Get full text
Thesis
