Search Results - (( based competency drops algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Traffic scheduling and link sharing mechanisms for controlled load service / Chin Yun Choong by Chin , Yun Choong

    Published 2000
    “…The simulation adopts some of the features of the Class Based Queueing. The main factors that determine whether a packet scheduling algorithm is able to support integrated services or differentiated services on Internet is the ability to provide bandwidth guarantee. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants by M, Irfan, N, Lukman, A. A, Alfauzi, J, Jumadi

    Published 2019
    “…The results of the study were conducted, based on the accuracy of SVM, which was 82.33% and C4.5 89.29 %%. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Simulated Kalman Filter algorithms for solving optimization problems by Nor Hidayati, Abdul Aziz

    Published 2019
    “…The proposed population-based SKF algorithm and the single solution-based SKF algorithm use the scalar model of discrete Kalman filter algorithm as the search strategy to overcome these flaws. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    A new countermeasure to combat the embedding-based attacks on the goldreich-goldwasser-halevi lattice-based cryptosystem by Arif Mandangan, Nazreen Syazwina Nazaruddin, Muhammad Asyraf Asbullah, Hailiza Kamarulhaili, Che Haziqah Che Hussin, Babarinsa Olayiwola

    Published 2024
    “…Despite being considered the first practical lattice-based cryptosystem, interest from the post-quantum cryptography society in the Goldreich-Goldwasser-Halevi (GGH) lattice-based cryptosystem drastically drop due to the embedding-based attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A new countermeasure to combat the embedding-based attacks on the Goldreich-Goldwasser-Halevi lattice-based cryptosystem by Mandangan, Arif, Nazaruddin, Nazreen Syazwina, Asbullah, Muhammad Asyraf, Kamarulhaili, Hailiza, Che Hussin, Che Haziqah, Olayiwola, Babarinsa

    Published 2024
    “…Despite being considered the first practical lattice-based cryptosystem, interest from the post-quantum cryptography society in the Goldreich-Goldwasser-Halevi (GGH) lattice-based cryptosystem drastically drop due to the embedding-based attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8