Search Results - (( java implementation level algorithm ) OR ( using network modeling algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal
  7. 7

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Toxic Gas Dispersion Model Based On Neural Pattern Recognition Networks by Roslan, Nurfarah Arina

    Published 2022
    “…Following the best selection of neural network algorithm, BR algorithm is further trained using 50-70% training with 10-28 hidden neurons. …”
    Get full text
    Get full text
    Monograph
  12. 12

    Application of artificial neural network genetic algorithm in inferential estimation and control of a distillation column by Chen, Wah Sit

    Published 2005
    “…Comparisons were also made to the feedforward network model trained using Levenberg-Marquardt (LM) training algorithm as well as Elman network. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Eye Diagram Modeling Of High-Speed Channels Using Artificial Neural Networks With An Improved Adaptive Sampling Algorithm by Goay, Chan Hong

    Published 2019
    “…This work proposes an improvement to the original adaptive sampling algorithm and uses it as the sampling method for eye diagram modeling. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Dynamic Bayesian networks and variable length genetic algorithm for designing cue-based model for dialogue act recognition by Yahya, Anwar Ali, Mahmod, Ramlan, Ramli, Abd Rahman

    Published 2010
    “…In the initial stage, the dynamic Bayesian network model is constructed using sets of lexical cues selected manually from the dialogue corpus. …”
    Get full text
    Get full text
    Article
  15. 15

    Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic: article / Aini Azmi by Azmi, Aini

    Published 2016
    “…The objective of this research is to characterize YouTube video traffic on broadband network, to fit the original traffic to best traffic model and Bandwidth control algorithm is developed based on the real live traffic and using the fitted traffic model. …”
    Get full text
    Get full text
    Article
  16. 16

    Peak time bandwidth control algorithms with fitted traffic model on broadband network YouTube video traffic / Aini Azmi by Azmi, Aini

    Published 2016
    “…The objective of this research is to characterize YouTube video traffic on broadband network, to fit the original traffic to best traffic model and Bandwidth control algorithm is developed based on the real live traffic and using the fitted traffic model. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Backpropagation neural network training algorithm analysis / Shahrul Azmi Rosli by Rosli, Shahrul Azmi

    Published 2010
    “…This paper presents the analysis of Backpropagation Neural Network Training Algorithms in Artificial Neural Network (ANN) using MATLAB and demonstrates the analysis of training algorithms using the dataset of concrete compressive strength.…”
    Get full text
    Get full text
    Thesis
  18. 18

    Implementing artificial neural networks and genetic algorithms to solve modeling and optimisation of biogas production by Abdul Sahli, Fakharudin, Md Nasir, Sulaiman, Jailani, Salihon, Norazwina, Zainol

    Published 2013
    “…This paper proposed a framework to model and optimises a biogas production using artificial neural networks and genetic algorithms. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Hybrid bat algorithm-artificial neural network for modeling operating photovoltaic module temperature: article / Noor Rasyidah Hussin by Hussin, Noor Rasyidah

    Published 2014
    “…Bat Algorithm (BA) was hybrid based Multi-Layer Feedforward Neural Network (MLFNN) for modeling the temperature operating of photovoltaic module. …”
    Get full text
    Get full text
    Article
  20. 20

    A study on regional GDP forecasting analysis based on radial basis function neural network with genetic algorithm (RBFNN-GA) for Shandong economy by Qing, Zhang, Abdullah, Abdul Rashid, Choo, Wei Chong, Ali, Mass Hareeza

    Published 2022
    “…This study uses the genetic algorithm radial basis, neural network model, to make judgments on the relationships contained in this sequence and compare and analyze the prediction effect and generalization ability of the model to verify the applicability of the genetic algorithm radial basis, neural network model, based on the modeling of historical data, which may contain linear and nonlinear relationships by itself, so this study uses the genetic algorithm radial basis, neural network model, to make, compare, and analyze judgments on the relationships contained in this sequence.…”
    Get full text
    Get full text
    Article