Search Results - (( java implementation level algorithm ) OR ( quality function using algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal
  6. 6

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Ringed seal search for global optimization via a sensitive search model / Younes Saadi by Younes, Saadi

    Published 2018
    “…The quality of the algorithm is comprehensively evaluated on various standard benchmark test functions using variety of quality metrics and using three baseline algorithms for comparison. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Monthly chlorophyll-a prediction using neuro-genetic algorithm for water quality management in Lakes by Lee, G., Bae, J., Lee, S., Jang, M., Park, H.

    Published 2016
    “…Practical uses for NGA in proactive water quality management are also discussed in this study.…”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Hybrid of firefly algorithm and pattern search for solving optimization problems by Wahid, Fazli, Ghazali, Rozaida

    Published 2018
    “…The proposed technique has been named as FA-PS in which PS has been used to introduce enhancement in the solution quality of standard FA. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Curve Reconstruction By Metaheuristics Algorithms On Cubic Rational Bézier Function by Mohamed, Najihah

    Published 2019
    “…Various of curve fitting studies had been done by many researchers specifically using optimisation technique. The optimisation technique consists of exact algorithm, and approximate algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources by Al-Qadhi, Abdulrahman K., Athauda, Rukshan, Latip, Rohaya, Hussin, Masnida

    Published 2026
    “…Next, the Dynamic Demand Replacement Algorithm (DDRA) algorithm is used to place in-demand functions near the edge nodes periodically, while the proposed task scheduling algorithm - Maximum Revenue Bid (MRB) is used to give priority to tasks to maximise revenue near the edge. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Agarwood oil quality classification using one versus all strategies in multiclass on SVM model / Aqib Fawwaz Mohd Amidon … [et al.] by Mohd Amidon, Aqib Fawwaz, Mahabob, Noratikah Zawani, Ismail, Nurlaila, Mohd Yusoff, Zakiah, Taib, Mohd Nasir

    Published 2021
    “…Support vector machine (SVM) has been chosen as a main model and for the specific function algorithm was multiclass function. Then, in the function, the one versus all (OVA) strategies has been used. …”
    Get full text
    Get full text
    Get full text
    Book Section
  17. 17

    A Reference Based Surface Defect Segmentation Algorithm For Automatic Optical Inspection System by Wong, Ze-Hao

    Published 2020
    “…Then, the histogram distance function for each location is computed using a pseudo-probability combination of novel histogram distance functions on a clustered histogram. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Frequency variations measurement techniques in power quality monitoring by Wood, Terence

    Published 2008
    “…Power quality is a term used to describe electric power that motivates an electrical load and the load's ability to function properly with that electric power. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Denosing of natural image based on non-linear threshold filtering using discrete wavelet transformation by Khmag, Asem, Ramli, Abdul Rahman, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Hashim, Shaiful Jahari

    Published 2014
    “…This paper treats with threshold estimation technique to reduce the noise in natural images by using on discrete wavelet transformation. Calculating the value of thresholding, the way it works in the algorithm (derivation of thresholding function) and the type of wavelet mother functions, are pivotal issues in the field of denoising based wavelet approach. …”
    Get full text
    Get full text
    Article