Search Results - (( java implementation level algorithm ) OR ( using interactive maps algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Investigating rendering speed and download rate of three-dimension (3D) mobile map intended for navigation aid using genetic algorithm by Abubakar, Adamu, Zeki, Akram M., Chiroma, Haruna, Herawan, Tutut

    Published 2014
    “…This paper investigates the trade-off between rendering speed and download rate of the 3D mobile map using genetic algorithm (GA). The reason of using GA is because it takes larger problem space than other algorithms for optimization, which is well suited for establishing fast 3D map rendering speed on-the-fly to the mobile device that requires useful solutions for optimization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal
  7. 7

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    2D and 3D phase mapping of laser interacted interferograms by Yahaya, Asiah, Munajat, Yusof

    Published 2009
    “…Three simultaneously-captured interferograms were processed using the chosen algorithm. With Mathcad programming, 2D and 3D phase changes from a laserinteraction event represented in the three-interferograms were successfully mapped…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Combinatorial interaction testing of software product lines: a mapping study by Sahid, Mohd Zanes, Md Sultan, Abu Bakar, Abdul Ghani, Abdul Azim, Baharom, Salmi

    Published 2016
    “…This paper reports a systematic mapping study (SMS) of relevant primary studies as the evidence on the application of Combinatorial Interaction Testing (CIT) for SPL. …”
    Get full text
    Get full text
    Article
  13. 13

    Landslide susceptibility mapping using decision-tree based chi-squared automatic interaction detection (CHAID) and logistic regression (LR) integration by Althuwaynee, Omar F., Pradhan, Biswajeet, Ahmad, Noordin

    Published 2014
    “…Clustered locations were used as model training data with 14 landslide conditioning factors such as; topographic derived parameters, lithology, NDVI, land use and land cover maps. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    The development of virtual product life cycle design tool using artificial intelligence technique by Harun, Habibollah, Ismail @ Ishak, Hasrul Haidar, Sukimin, Zuraini

    Published 2008
    “…The generated features from code classification algorithm give the information of machining parameter through the mapping algorithm. …”
    Get full text
    Monograph
  15. 15

    Optimal path planning algorithms in virtual environments by Hassan, Rohayanti

    Published 2006
    “…A* algorithm was also incorporated with Cell Mapping technique to speed up the searching process. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Designing substitution boxes based on chaotic map and globalized firefly algorithm by Ahmed, Hussam Alddin Shihab

    Published 2019
    “…The first variation of FA is called chaotic firefly algorithm (CFA), which was initialized using discrete chaotic map to enhance the algorithm to start the search from good positions. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Real-time interactive spatial augmented reality (RISAR) platform by Chan, Aye Zay Hta

    Published 2022
    “…The main contributions of this Real-time Interactive Spatial Augmented Reality (RISAR) platform include (i) an algorithm that supports real-time physical structure reconstruction using Lego blocks and projection mapping, and (ii) a design of a SAR platform with low-cost and easily accessible hardware and software. …”
    Get full text
    Thesis
  18. 18

    A cognitive mapping approach in real-time haptic rendering interaction for improved spatial learning ability among autistic people / Kesavan Krishnan by Kesavan , Krishnan

    Published 2024
    “…Meanwhile, experimental evaluation of the application was conducted in four different groups to measure the efficiency and performance of the application; experimental evaluation based on navigation algorithms, experimental evaluation based on haptic sensory sensitivity, experimental evaluation based on real-time haptic rendering interaction and experimental evaluation based on the performance of autistic people with using the application in spatial learning and cognitive mapping. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Forest mapping in Peninsular Malaysia using Random Forest and Support Vector Machine Classifiers on Google Earth Engine by Farah Nuralissa Muhammad, Lam, Kuok Choy

    Published 2023
    “…The accuracy assessment test using the Kappa coefficient resulted in a value of 0.7893 for the RF algorithm and 0.6328 for the SVM algorithm for the year 2010. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Sequence diagram synthesis theory for stitching together multiple sequence diagrams through formal semantics modelling by Ameedeen, Mohamed Ariff, Zamli, K. Z., Ong, Muhamad Idaham Umar, Thong, Weng Jie

    “…This is the main motivation for this thesis, which is to create an algorithm for mapping Petri Nets to UML Sequence Diagram. …”
    Get full text
    Get full text
    Research Report