Search Results - (( pre optimization means algorithm ) OR ( java implementation level algorithm ))
Search alternatives:
- implementation level »
- java implementation »
- optimization means »
- pre optimization »
- means algorithm »
- level algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Optimized clustering with modified K-means algorithm
Published 2021“…Among the techniques, the k-means algorithm is the most commonly used technique for determining optimal number of clusters (k). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
5
A Hybrid Least Squares Support Vector Machine with Bat and Cuckoo Search Algorithms for Time Series Forecasting
Published 2020“…However, its operation relies on two important parameters (regularization and kernel). Pre-determining the values of parameters will affect the results of the forecasting model; hence, to find the optimal value of these parameters, this study investigates the adaptation of Bat and Cuckoo Search algorithms to optimize LSSVM parameters. …”
Get full text
Get full text
Article -
6
Discovering optimal clusters using firefly algorithm
Published 2016“…Existing conventional clustering techniques require a pre-determined number of clusters, unluckily; missing information about real world problem makes it a hard challenge.A new orientation in data clustering is to automatically cluster a given set of items by identifying the appropriate number of clusters and the optimal centre for each cluster.In this paper, we present the WFA_selection algorithm that originates from weight-based firefly algorithm.The newly proposed WFA_selection merges selected clusters in order to produce a better quality of clusters.Experiments utilising the WFA and WFA_selection algorithms were conducted on the 20Newsgroups and Reuters-21578 benchmark dataset and the output were compared against bisect K-means and general stochastic clustering method (GSCM).Results demonstrate that the WFA_selection generates a more robust and compact clusters as compared to the WFA, bisect K-means and GSCM.…”
Get full text
Get full text
Article -
7
Effective k-Means Clustering in Greedy Prepruned Tree-based Classification for Obstructive Sleep Apnea
Published 2022“…GPrTC algorithm showed better classification accuracies than k-means clustering in almost all the assigned datasets. …”
Get full text
Get full text
Get full text
Article -
8
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
9
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
10
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
11
Document clustering for knowledge discovery using nature-inspired algorithm
Published 2014“…As the internet is overload with information, various knowledge based systems are now equipped with data analytics features that facilitate knowledge discovery.This includes the utilization of optimization algorithms that mimics the behavior of insects or animals.This paper presents an experiment on document clustering utilizing the Gravitation Firefly algorithm (GFA).The advantage of GFA is that clustering can be performed without a pre-defined value of k clusters.GFA determines the center of clusters by identifying documents with high force.Upon identification of the centers, clusters are created based on cosine similarity measurement.Experimental results demonstrated that GFA utilizing a random positioning of documents outperforms existing clustering algorithm such as Particles Swarm Optimization (PSO) and K-means.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Statistical data preprocessing methods in distance functions to enhance k-means clustering algorithm
Published 2018“…It is attained successfully by combining the mean in K-Means algorithm, minimum and maximum in K-Midranges algorithm and compute their average as mean cluster of Hybrid mean. …”
Get full text
Get full text
Get full text
Thesis -
13
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
14
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
15
Comparative analysis of K-Means and K-Medoids for clustering exam questions / Nurul Zafirah Mokhtar
Published 2016“…Determining the suitable algorithm which can bring the optimized group clusters could be an issue. …”
Get full text
Get full text
Thesis -
16
Optimization of Multilayer Perceptron (MLP) network training algorithms for agrwood oil quality separation / Noratikah Zawani Mahabob ... [et al.]
Published 2020“…As a part of on-going research in classifying the agarwood oil quality, this research presented the optimization of the Multilayer Perceptron (MLP) network with the three different training data network algorithms; Scaled-Conjugate Gradient (SCG), Levenberg Marquardt (LM), and Resilient-Backpropagation (RBP). …”
Get full text
Get full text
Conference or Workshop Item -
17
A Modified Symbiotic Organism Search Algorithm with Lévy Flight for Software Module Clustering Problem
Published 2020“…To date, there are much increasing trends on adopting parameter free meta-heuristic algorithms for solving general optimization problems. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Fireflyclust: an automated hierarchical text clustering approach
Published 2017“…Various clustering algorithms have been reported in the literature but most of them rely on a pre-defined value of the k clusters. …”
Get full text
Get full text
Get full text
Article -
19
Noise Cancellation method in assistive listening system
Published 2020“…Those algorithms were Least Means Square, Normalize-Least Means Square, Recursive Least Square, Simple SetMembership Algorithm and Dynamic Set-Membership Affine Projection Algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
20
FEATURES EXTRACTION OF FINGERPRINTS BASED ON HYBRID PARTICLE SWARM OPTIMIZATION AND BAT ALGORITHMS
Published 2023“…In this paper, a new hybrid strategy Particle Swarm Optimization (PSO) with Bat Algorithm (BA) is proposed to extract features from fingerprint images. …”
Article
