Search Results - (( java implementation level algorithm ) OR ( using simulation cell algorithm ))
Search alternatives:
- implementation level »
- java implementation »
- level algorithm »
- simulation cell »
- cell algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
4
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
5
A Collision Detection Algorithm For Virtual Robot-Centered Flexible Manufacturing Cell
Published 2008“…This thesis presents a collision detection algorithm for accurate simulation of a virtual flexible manufacturing cell. …”
Get full text
Get full text
Thesis -
6
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
7
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
8
Indoor global path planning based on critical cells using dijkstra algorithm
Published 2015“…These critical cells are used as the vertices to the Dijkstra algorithm, with distances between two successive cells as edges between them, and the shortest path between a set of predefined points within the terrain can then be calculated. …”
Get full text
Get full text
Article -
9
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
10
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
11
Parameter characterization of PEM fuel cell mathematical models using an orthogonal learning-based GOOSE algorithm
Published 2025“…In order to validate the proposed algorithm, a number of experiments using various datasets were conducted and compared the outcomes with different�state-of-the-art algorithms. …”
Article -
12
Scheduling dynamic cellular manufacturing systems in the presence of cost uncertainty using heuristic method
Published 2016“…Then, design of experiments is used to examine the sensitivity of the parameters of each solving algorithm using Taguchi method. …”
Get full text
Get full text
Thesis -
13
Dynamic modelling of a two-stage ATM Tandem Banyan Switch / Tham Hon Loke
Published 2002“…The algorithm covers all cell flow patterns that are possible in a 2 Inports x 2 Outports Banyan Switch. …”
Get full text
Get full text
Thesis -
14
Path planning algorithm for a car-like robot based on cell decomposition method
Published 2013“…Using cell decomposition, the free space of the robot is exactly partitioned into cells. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Comparative analysis of danger theory variants in measuring risk level for text spam messages
Published 2024journal::journal article -
16
Application of genetic algorithms to model parameter identification of a recombinant e.coli high-cell density fed-batch fermentation / Kamaruddin Mamat and Farida Zuraina Mohd Yuso...
Published 2008“…In this work, a genetic algorithm was used to estimate both yield and kinetic coefficients of an unstructured model representing a fed-batch high-cell density fermentation of Escherichia coli (E. coli). …”
Get full text
Get full text
Conference or Workshop Item -
17
Hybrid artificial intelligent algorithm for call admission control in WCDMA mobile network
Published 2023“…The proposed algorithm, support vector regression assists genetic algorithm (SVRaGA) was tested in a dynamic WCDMA mobile network simulator. …”
Conference paper -
18
Application of genetic algorithms to model parameter identification of a recombinant e.coli high-cell density fedbatch fermentation / Kamaruddin Mamat and Farida Zuraina Mohd Yusof
Published 2008“…In this work, a genetic algorithm was used to estimate both yield and kinetic coefficients of an unstructured model representing a fed-batch high-cell density fermentation of Escherichia coli (E.coli). …”
Get full text
Get full text
Conference or Workshop Item -
19
DSP controlled isolated DC-DC converter for distributed generation system
Published 2023“…Digital Signal Processing (DSP) board is used to implement the control algorithm. The control algorithm includes phase-shift PWM and PID close loop control, are designed using SIMULINK Embedded Target Library which are used to represent algorithms and peripherals specific DSP family. …”
Article -
20
Distributed learning based energy-efficient operations in small cell networks
Published 2023“…To achieve these goals, a cell selection algorithm is proposed that overcomes the issues of conflicts and load imbalance while reducing energy consumption. …”
Get full text
Get full text
Thesis
