Search Results - (( sequence identification system algorithm ) OR ( java implementation level algorithm ))
Search alternatives:
- sequence identification »
- identification system »
- implementation level »
- java implementation »
- system algorithm »
- level algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Enhancing counterfeit tag detection for RFID system using slotted aloha
Published 2021“…The track sequence number (TSN) was integrated with the time of arrival (TOA) at the detection stage to check the sequence process for the entire system from one stage to another, thus giving the system the capability to uniquely differentiate between counterfeit tag and the genuine tag. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
5
Parallel implementation of genomic sequences classification using modified gabor wavelet transform on multicore systems
Published 2012“…This paper presents the parallel implementation of the gene and exon identification of DNA sequences using the previously developed modified Gabor wavelet transform on multicore systems. …”
Get full text
Get full text
Proceeding Paper -
6
-
7
SYSTEM IDENTIFICATION AND MODEL PREDICTIVE CONTROL FOR INTERACTING SERIES PROCESS WITH NONLINEAR DYNAMICS
Published 2009“…Several important issues in the identification process and real-time implementation of model predictive control algorithm are also discussed. …”
Get full text
Get full text
Thesis -
8
-
9
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
10
Fingerprint recognition system
Published 2005“…Fingerprint recognition is the oldest method which has been used in numerous applications for identification purpose in many social conditions such as access control and crime investigation.Now a day,in the era of technology the system is still using the password or smart card as an identity character for identification purpose.The problems happen when user forgot their password or lost their smart card. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
12
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Kalman filter based impedance parameter estimation for transmission line and distribution line
Published 2019“…However, this is not true for certain low voltage systems or systems with short lines. In these cases, for transmission lines that are not fully transposed, the three sequence networks will be mutually coupled. …”
Get full text
Get full text
Thesis -
14
NARX modelling for steam distillation pilot plant using binary particle swarm optimisation technique / Najidah Hambali
Published 2019“…A system identification in control engineering field is a mathematical model based on dynamic properties of the system. …”
Get full text
Get full text
Thesis -
15
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
16
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
17
-
18
Genome-wide computational identification of biologically significant cis-regulatory elements and associated transcription factors from rice
Published 2019“…In this study, we tested the applicability of two algorithms developed for other model systems for the identification of biologically significant CREs of co-expressed genes from rice. …”
Get full text
Get full text
Get full text
Article -
19
Dataset of 16S ribosomal DNA sequences of bacteria isolated from marine red algae Kappapycus alvarezii
Published 2022“…Taxonomic identification for the assembled sequences was achieved us- ing the online BLAST (blastn) algorithm, and the construction of a phylogenetic tree was performed using the MEGA7 soft- ware. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
20
A Study of the Contribution of Nearest-Neighbour Thermodynamic Parameters to the DNA Sequences Generated by Ant Colony Optimisation
Published 2013Get full text
Get full text
Conference or Workshop Item
