Search Results - (( java implementation level algorithm ) OR ( using solving delay algorithm ))

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Predictor-corrector scheme in modified block method for solving delay differential equations with constant lag by Abdul Aziz, Nurul Huda, Abdul Majid, Zanariah, Ismail, Fudziah

    Published 2014
    “…In this paper, the numerical solution of delay differential equations using a predictor-corrector scheme in modified block method is presented. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Block multistep methods for solving first order retarded and neutral delay differential equations by Abdul Aziz, Nurul Huda

    Published 2015
    “…A new subroutine function has been added in the developed algorithm with the capabilities to approximate the neutral delay term using the interpolation of function evaluation. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Predictor-corrector scheme in modified block method for solving delay differential equations with constant lag by Nurul Huda Abdul Aziz, Zanariah Abdul Majid, Fudziah Ismail

    Published 2014
    “…In this paper, the numerical solution of delay differential equations using a predictor-corrector scheme in modified block method is presented. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    One-step block methods for solving ordinary and delay differential equations by Mohd Radzi, Hazwani

    Published 2011
    “…Subsequently, the codes were then adapted to solve first order DDEs and the delay term is approximated using Neville’s interpolation. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Solving delay differential equations using modified 2-point block method by Abdul Aziz, Nurul Huda, Abdul Majid, Zanariah

    Published 2012
    “…The Newton divided difference interpolation has been used to approximate the delay solutions and the algorithm is implemented in variable step size. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    Multistep block methods for solving higher order delay differential equations by Hoo, Yann Seong

    Published 2016
    “…The delay term in DDEs with constant delays is approximated using Hermite interpolation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Adam’s type block methods for solving neutral delay differential equation with constant and panthograph delay by Ismail, Nur Inshirah Naqiah

    Published 2019
    “…The multistep block methods will be implemented in solving NDDE with constant and pantograph delay types using constant step size. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Solving delay differential equations (DDEs) using nakashima's 2 stages 4th order Pseudo-Runge-Kutta method by Ayunni Sarbi N.A., Bin Mamat M.B.

    Published 2013
    “…This paper is investigate numerically the problem on solving Delay Differential Equations (DDEs) using Nakashima’s 2 Stages 4th Order Pseudo-Runge-Kutta Method and also developed the algorithm of Nakashima’s 2 Stages 4th Order Pseudo-Runge-Kutta Method incorporates with Hermite Interpolation. …”
    Get full text
    Non-Indexed Article
  12. 12

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15
  16. 16

    Performance of Ad-Hoc on-Demand Distance Vector Discovery Algorithms Based On Packet Lifetime by Ahmad, Noor Azlan

    Published 2008
    “…The performance analysis of the proposed algorithms was conducted by using the discrete-event simulator, OMNeT++. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Diagonally multistep block method for solving Volterra integro-differential equation with delay by Baharum, Nur Auni, Abdul Majid, Zanariah, Senu, Norazak, Rosali, Haliza

    Published 2023
    “…Volterra integro-differential equation with delay (VIDED) is solved using a diagonally multistep block method (DMB). …”
    Get full text
    Get full text
    Article
  19. 19

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
    Get full text
    Get full text
    Journal
  20. 20

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article