Search Results - (( java implementation level algorithm ) OR ( strategy implementation clustering algorithm ))
Search alternatives:
- implementation clustering »
- strategy implementation »
- implementation level »
- java implementation »
- level algorithm »
-
1
-
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
3
-
4
An Effective Power Dispatch Strategy for Clustered Micro-grids while Implementing Optimal Energy Management and Power Sharing Control using Power Line Communication
Published 2019“…This paper proposes an effective power dispatch strategy for clustered micro-grids. The developed hybrid algorithm implements optimal energy management and power sharing control using binary data. …”
Get full text
Get full text
Get full text
Proceeding -
5
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Cluster detection for spatio-temporal dengue cases at Selangor districts using multi-EigenSpot algorithm
Published 2022“…Parametric assumptions commonly implemented in most of algorithm in cluster detections. …”
Get full text
Get full text
Conference or Workshop Item -
7
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
8
Kernel and multi-class classifiers for multi-floor wlan localisation
Published 2016“…For floor localisation, the strategy is based on developing the algorithm to determine the floor by utilising fingerprint clustering technique. …”
Get full text
Get full text
Thesis -
9
Application model of k-means clustering: Insights into promotion strategy of vocational high school
Published 2023“…Data mining techniques in this initiative were applied to achieve in determining the promotional strategy. Using Clustering K-Means algorithm, it is one method of non-hierarchical clustering data in classifying student data into multiple clusters based on similarity of the data, so that student data that have the same characteristics are grouped in one cluster and that have different characteristics grouped in another cluster. …”
Article -
10
Detecting space-time disease clusters with arbitrary shapes and sizes using a co-clustering approach
Published 2017“…To address this problem, a new algorithm is proposed, which uses a co-clustering strategy to detect prospective and retrospective space-time disease clusters with no restriction on shape and size. …”
Get full text
Get full text
Article -
11
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
12
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
13
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
14
An eigenspace approach for detecting multiple space-time disease clusters: Application to measles hotspots detection in khyber-pakhtunkhwa, Pakistan
Published 2018“…Identifying the abnormally high-risk regions in a spatiotemporal space that contains an unexpected disease count is helpful to conduct surveillance and implement control strategies. The EigenSpot algorithm has been recently proposed for detecting space-time disease clusters of arbitrary shapes with no restriction on the distribution and quality of the data, and has shown some promising advantages over the state-of-the-art methods. …”
Get full text
Get full text
Article -
15
An eigenspace approach for detecting multiple space-time disease clusters: Application to measles hotspots detection in khyber-pakhtunkhwa, Pakistan
Published 2018“…Identifying the abnormally high-risk regions in a spatiotemporal space that contains an unexpected disease count is helpful to conduct surveillance and implement control strategies. The EigenSpot algorithm has been recently proposed for detecting space-time disease clusters of arbitrary shapes with no restriction on the distribution and quality of the data, and has shown some promising advantages over the state-of-the-art methods. …”
Get full text
Get full text
Article -
16
Benchmarking Framework for Performance in Load Balancing Single System Image
Published 2009“…There is an essential need for a benchmark framework for the Single System Image clusters due to the wide range of implementation and the need for identifying the performance and behaviour of the system. …”
Get full text
Get full text
Thesis -
17
Stock prediction by applying hybrid Clustering-GWO-NARX neural network technique
Published 2017“…It applies K-means clustering algorithm to determine the most promising cluster, then MGWO is used to determine the classification rate and finally the stock price is predicted by applying NARX neural network algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
18
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
19
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
20
Hybrid clustering-GWO-NARX neural network technique in predicting stock price
Published 2017“…It applies K-means clustering algorithm to determine the most promising cluster, then MGWO is used to determine the classification rate and finally the stock price is predicted by applying NARX neural network algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
