Search Results - (( java implementation level algorithm ) OR ( using reading learning algorithm ))
Search alternatives:
- implementation level »
- java implementation »
- learning algorithm »
- reading learning »
- level algorithm »
- using reading »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
4
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
5
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
6
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Virtual reality in algorithm programming course: practicality and implications for college students
Published 2024“…The analysis of learning problems shows the unavailability of interactive learning media that can support various learning styles of students in programming algorithm materials. …”
Get full text
Get full text
Get full text
Article -
8
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
9
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
10
Identification of tajwid using artificial neural networks / Zunnajah Kamaruddin
Published 2005“…In order to have a system which has an ability to learn, back-propagation learning algorithm is used. …”
Get full text
Get full text
Thesis -
11
Automatic detection and indication of pallet-level tagging from rfid readings using machine learning algorithms
Published 2020“…Furthermore, the efficacy of different models based on heuristic hyperparameter tuning is evaluated in which the different kernel function for Support Vector Machine, various distance metrics of k-Nearest Neighbors. The ensemble learning technique, changes of activation function in Neural Network as well as the unsupervised learning (k-means clustering algorithm and Friis Transmission Equation) was also applied to classify the multiclass classification in pallet-level. …”
Get full text
Get full text
Thesis -
12
Smart object detection using deep learning algorithm and jetson nano for blind people
Published 2021“…Visual impairment may cause people difficulties with normal daily activities such as driving, reading, socializing and walking. Therefore, this project develops a smart object detection using deep learning algorithm and jetson nano to improve object detection for blind people. …”
Get full text
Get full text
Conference or Workshop Item -
13
Prediction of Machine Failure by Using Machine Learning Algorithm
Published 2019Get full text
Get full text
Final Year Project -
14
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…This system is achieved using the Genetic Algorithm which is capable of performing information retrieval and learning algorithm. …”
Get full text
Get full text
Thesis -
15
Diagnostic And Classification System For Kids With Learning Disabilities
Published 2017“…Most experts are using manual techniques to diagnose dyslexia. Machine learning algorithms are capable enough to learn the knowledge of experts and thus, automation of the diagnosis process is possible. …”
Get full text
Get full text
Proceeding -
16
A deep reinforcement learning hybrid algorithm for the computational discovery and characterization of small proteins utilizing mycobacterium tuberculosis as a model
Published 2025“…This study presents the development and evaluation of a novel hybrid machine learning algorithm that integrates the strengths of Random Forest and Gradient Boosting models to enhance the prediction of smORFs. …”
Get full text
Get full text
Thesis -
17
-
18
Fatigue State Detection Through Multiple Machine Learning Classifiers Using EEG Signal
Published 2023“…This study is conducted to provide a comprehensive and reliable fatigue state detection system to avoid accidents and make a good decision. Three machine learning algorithms were applied to seventy-six subjects' electroencephalogram (EEG) readings to test their performance. …”
Get full text
Get full text
Get full text
Article -
19
Secure E-Voting With Blind Signature
Published 2003“…In this system, voter’s privacy is guaranteed by using a blind signature for confidentiality and voter’s digital signature for voter’s authentication. E-Voting is implemented by employing Java socket technology and BouncyCastle cryptography provider. …”
Get full text
Get full text
Conference or Workshop Item -
20
A hybrid approach for personalized news recommendation with ordered clustering algorithm, rich user and news metadata
Published 2019“…Scalability is one of the issues in news recommendation that requires effective algorithms to deal with large news corpus. One of the common strategies used for solving scalability is clustering. …”
Get full text
Get full text
Thesis
