Search Results - (( simulation identification task algorithm ) OR ( java implementation level algorithm ))
Search alternatives:
- simulation identification »
- implementation level »
- identification task »
- java implementation »
- level algorithm »
- task algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
A Robust Firearm Identification Algorithm of Forensic Ballistics Specimens
Published 2017“…This study found that the proposed algorithm is able to perform the identical task on the noisy images with noise levels as high as 70%, while maintaining a firearm identification accuracy rate of over 90%. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…The algorithm simulates two important tasks that are frequently used by the human experts to identify summarizing strategies used to produce the summary sentences: 1) sentences relevance identification; and 2) summarizing strategies identification. …”
Get full text
Get full text
Thesis -
5
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
6
Comparison between multi-objective and single-objective optimization for the modeling of dynamic systems
Published 2013Get full text
Working Paper -
7
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
8
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
9
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
10
Electroencephalography Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation
Published 2015“…The proposed hardware simulator will enhance researchers and hardware validators to simulate, validate and test their detection algorithms forehand, as well as for clinicians to use this system for training as well as for academic exercises. …”
Get full text
Get full text
Article -
11
Artificial Bee Colony algorithm in estimating kinetic parameters for yeast fermentation pathway
Published 2023“…The experimental results show that ABC outperforms other estimation algorithms and gives more accurate kinetic parameter values for the simulated model. …”
Get full text
Get full text
Get full text
Article -
12
Weighted Watson-crick automata and applications in halal authentication
Published 2016“…We also construct formal models for food authentication processes and develop algorithms for the identification of non halal patterns in DNA molecules. …”
Get full text
Get full text
Monograph -
13
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
14
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
15
EEG Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation
Published 2015“…The proposed hardware simulator will enhance researchers and hardware validators to simulate, validate and test their detection algorithms forehand, as well as for clinicians to use this system for training as well as for academic exercises. …”
Get full text
Get full text
Citation Index Journal -
16
-
17
-
18
A comparative study of vibrational response based impact force localization and quantification using radial basis function network and multilayer perceptron
Published 2017“…Thus, there is a room for improvement to find an alternate algorithm that has great advantage over MLP. For this reason, this study proposes Radial Basis Function Network (RBFN) for possible further improvement in impact identification task. …”
Get full text
Get full text
Article -
19
A novel quantum calculus-based complex least mean square algorithm (q-CLMS)
Published 2022“…Extensive experiments are performed on system identification and channel equalization tasks and the proposed algorithm is shown to outperform several benchmark and state-of-the-art approaches namely Complex Least Mean Square (CLMS), Normalized Complex Least Mean Square (NCLMS), Variable Step Size Complex Least Mean Square (VSS-CLMS), Complex FLMS (CFLMS) and Fractional-ordered-CLMS (FoCLMS) algorithms. …”
Get full text
Get full text
Article -
20
A novel quantum calculus-based complex least mean square algorithm (q-CLMS)
Published 2022“…Extensive experiments are performed on system identification and channel equalization tasks and the proposed algorithm is shown to outperform several benchmark and state-of-the-art approaches namely Complex Least Mean Square (CLMS), Normalized Complex Least Mean Square (NCLMS), Variable Step Size Complex Least Mean Square (VSS-CLMS), Complex FLMS (CFLMS) and Fractional-ordered-CLMS (FoCLMS) algorithms. …”
Get full text
Get full text
Article
