Search Results - (( _ certification method algorithm ) OR ( java adaptation optimization algorithm ))
Search alternatives:
- adaptation optimization »
- certification method »
- method algorithm »
- java adaptation »
-
1
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
2
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
3
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Digital Certificate-based Authentication Model For Enhanced Smartphone Security
Published 2025journal::journal article -
5
Digital certificate-based authentication model for enhanced smartphone security / A. H. Azni, Sakiinah Altaf Hussain and Najwa Hayaati Mohd Alwi
Published 2025“…Aimed at addressing smartphone users' authentication needs, the model operates through three phases: Registration, Digital Certificate, and Authentication, each bolstering data protection through digital certificate-based authentication. …”
Get full text
Get full text
Get full text
Article -
6
The Effect of Entry Qualifications and Gender Towards Student Performance
Published 2009“…STPM is form six examinations in secondary school level. Genetic Algorithms (GA) and Radian Basis Function Network (RBFN) method was used to measure and predict the student’s performance. …”
Get full text
Get full text
Conference or Workshop Item -
7
Homotopy-perturbation method for solving linear and nonlinear differential equation
Published 2015Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Speech dereverberation enhancement
Published 2020Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure
Published 2022“…The proposed method removes the need for credentials, including client-server certificates and client-server key exchange.…”
Get full text
Get full text
Get full text
Proceeding -
10
-
11
Reliable access control for mobile cloud computing (MCC) with cache-aware scheduling
Published 2019“…Furthermore, the cache-based scheduling algorithm was upgraded to improve the response time of user jobs. …”
Get full text
Get full text
Get full text
Article -
12
Flexible content authorization using digital rights management in cloud computing / Ali Hussain
Published 2021“…The integrity of data is verified with the use of HMAC algorithm chain using the verify function of versifier in Macaroon. …”
Get full text
Get full text
Get full text
Thesis -
13
Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks
Published 2025“…The registration contract is performed by a certificate authority, and the key is generated using the Enhanced Elliptic Curve Digital Signature (EECDS) algorithm which improves the secure and private communication between the users, IoT devices, and edge-gateway. …”
Article
