Search Results - (( (variable OR variables) using modified algorithm ) OR ( java applications security algorithm ))
Search alternatives:
-
1
Optimized clustering with modified K-means algorithm
Published 2021“…In order to obtain the optimum number of clusters and at the same time could deal with correlated variables in huge data, modified k-means algorithm was proposed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Adapting the Elitism on the Greedy Algorithm for Variable Strength Combinatorial Test Cases Generation
Published 2018“…This algorithm is invariably called the modified greedy algorithm (MGA). …”
Get full text
Get full text
Get full text
Article -
3
-
4
A variable combinatorial test suite strategy based on modified greedy algorithm
Published 2015“…This proposed will suggest a new CIT strategy based on a modified greedy algorithm (MGA) with addressing the supporting of variable strength interaction to generate a satisfactory test suite size.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Robust diagnostics and variable selection procedure based on modified reweighted fast consistent and high breakdown estimator for high dimensional data
Published 2022“…The performance of the proposed method is illustrated using simulation study and on glass vessel data with 1920 variables, cardiomyopathy microarray data with 6319 variables, and octane data with 226 dimensions. …”
Get full text
Get full text
Thesis -
6
Minimizing power loss using modified artificial bee colony algorithm / Nur Azlin Ashiqin Mohd Amin ...[et al.]
Published 2021“…These control variable values are adjusted for loss reduction. MABC algorithm is tested on the standard IEEE-30 bus test system. …”
Get full text
Get full text
Get full text
Article -
7
Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm
Published 2007“…Then the algorithm gathers all the test cases based on the definition occurrence and def-use pair if they cover same definition occurrence of one variable but they don’t cover def-use pair of the same variable. …”
Get full text
Get full text
Thesis -
8
An algorithm for pulsed activation of solenoid valves for variable rate application of agricultural chemicals
Published 2008Get full text
Get full text
Conference or Workshop Item -
9
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
10
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
11
Comparative study of modified BFGS and new scale modified BFGS for solving unconstrained optimization / Shahirah Atikah Mohamad Husnin
Published 2018“…This indicated that the new scaled mBFGS algorithm performance is better than mBFGS algorithms.…”
Get full text
Get full text
Thesis -
12
-
13
-
14
Variable Neighborhood Descent and Whale Optimization Algorithm for Examination Timetabling Problems at Universiti Malaysia Sarawak
Published 2025“…A constructive algorithm was developed to generate an initial feasible solution, which was subsequently refined using two primary approaches to evaluate their efficiency: Iterative Threshold Pipe Variable Neighborhood Descent (IT-PVND), and a modified Whale Optimization Algorithm (WOA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
An Efficient Solution to Travelling Salesman Problem using Genetic Algorithm with Modified Crossover Operator
Published 2019“…This paper proposes an efficient and effective solution for solving such a query. A modified crossover method using Minimal Weight Variable, Order Selection Crossover operator, a modified mutation using local optimization and a modified selection method using KMST is proposed. …”
Get full text
Get full text
Get full text
Article -
16
-
17
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
18
Development of fault detection, diagnosis and control system identification using multivariate statistical process control (MSPC)
Published 2006“…In this research work, an FDD algorithm is developed using MSPC and correlation coefficients between process variables. …”
Get full text
Get full text
Monograph -
19
Comparing three methods of handling multicollinearity using simulation approach
Published 2006“…The algorithm is described and for the purpose of comparing the three methods, simulated data sets where the number of cases was less than the number of observations were used. …”
Get full text
Get full text
Thesis -
20
Predicting mortality of Malaysian patients with acute coronary syndrome (ACS) subtypes using machine learning and deep learning approaches / Muhammad Firdaus Aziz
Published 2022“…ML algorithms were used to examine significant variables utilising feature selection methods. …”
Get full text
Get full text
Get full text
Thesis
