Search Results - (( using simulation through algorithm ) OR ( java implementation level algorithm ))
Search alternatives:
- implementation level »
- java implementation »
- simulation through »
- through algorithm »
- level algorithm »
-
1
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
Get full text
Get full text
Thesis -
2
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
3
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
4
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
5
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
6
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
8
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
9
A fault syndromes simulator for random access memories
Published 2008“…Experimental results show that using the simulator for testing is more efficient than that of the traditional testing algorithm. …”
Get full text
Get full text
Article -
10
An Enhanced Simulated Annealing Routing Algorithm for Semi-Diagonal Torus Network
Published 2017“…The solution is further refined by re-routing all nets in different orders using simulated annealing method. Through simulation program, our proposed algorithm succeeded in performing complete routing up to 81 nodes with 40 nets in 9×9 SD-Torus network size.…”
Get full text
Get full text
Get full text
Article -
11
IMPLEMENTATION OF NOISE CANCELLATION WITH HARDWARE DESCRIPTION LANGUAGE
Published 2006“…The objective of this project is to implement noise cancellation technique on an FPGA using Hardware Description Language. The performance of several adaptive algorithms is compared to determine the desirable algorithm used for adaptive noise cancellation system. …”
Get full text
Get full text
Final Year Project -
12
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…Conventionally, the numerical simulations for such devices are obtained by using the commercial simulation packages based on the Finite Element Methods (FEM). …”
Get full text
Get full text
Thesis -
13
An improved simulated annealing algorithm to avoid crosstalk in optical omega network
Published 2006“…It is a good idea to use these two algorithms to improve the performance. …”
Get full text
Get full text
Conference or Workshop Item -
14
An efficient fault syndromes simulator for SRAM memories
Published 2009“…Experimental results show that using the simulator for testing is more efficient than that of the traditional testing algorithm. …”
Get full text
Get full text
Get full text
Article -
15
Efficient Sequential and Parallel Routing Algorithms in Optical Multistage Interconnection Network
Published 2005“…The efficient combination of simulated annealing algorithm with the best heuristic algorithms gave much better result in a very minimal time. …”
Get full text
Get full text
Thesis -
16
Cost-effective scheduling analysis through discrete event simulation for distributed systems
Published 2015“…There are researchers’ proposed scheduling algorithms and evaluated through simulation system in order to improve resource availability. …”
Get full text
Get full text
Get full text
Book Section -
17
Development of a Bioinspired optimization algorithm for the automatic generation of multiple distinct behaviors in simulated mobile robots
Published 2006“…Results showed that robot controllers could be successfully developed using the POE-MOEA algorithm. The generated robot controllers allowed the robots to move towards to the light source even the simulation and testing environments are noticeably different.…”
Get full text
Get full text
Research Report -
18
Efficient signaling schedule for centralized and distributed scheduling algorithms for wimax multi-hop relay networks
Published 2012“…In order to evaluate the proposed algorithms and validate their efficiency for IEEE 802.16j networks, the authors simulated the algorithms in QualNet simulator. …”
Get full text
Get full text
Thesis -
19
Encryption selection for WLAN IEEE802.11G
Published 2013“…In this study, MATLAB was used for the simulation and the parameters for the simulation were different size of text file, type of encryption algorithms and type of encryption protocols. …”
Get full text
Get full text
Thesis -
20
Enhanced genetic algorithm optimization model for a single reservoir operation based on hydropower generation: case study of Mosul reservoir, northern Iraq
Published 2016“…The first algorithm was based on the traditional simulation of reservoir operation, whilst the second algorithm (Salg) enhanced the GAOM by changing the population values of GA through a new simulation process of reservoir operation. …”
Get full text
Get full text
Get full text
Article
