Search Results - (( based e based algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- based e »
- e based »
-
1
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
Get full text
Get full text
Thesis -
2
Sequence and sequence-less t-way test suite generation strategy based on the elitist flower pollination algorithm
Published 2018“…If t-way strategies are to be adopted in such a system, there is also a need to support test data generation based on sequence of interactions. Addressing these aforementioned issues and complementing the existing sequence based strategies such as t-SEQ, Sequence Covering Array Generator and Bee Algorithm, this thesis presents a unified strategy based on the new meta-heuristic algorithm, called the Elitist Flower Pollination Algorithm (eFPA). …”
Get full text
Get full text
Thesis -
3
-
4
Enhanced gravitational search algorithm for nano-process parameter optimization problem / Norlina Mohd Sabri
Published 2020“…Based on the capabilities of the metaheuristic algorithms, this research is proposing the enhanced Gravitational Search Algorithm (eGSA) to solve the nano-process parameter optimization problem. …”
Get full text
Get full text
Thesis -
5
-
6
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
7
Dynamic Probability Selection for Flower Pollination Algorithm based on Metropolis-hastings Criteria
Published 2021“…Having only one parameter control (i.e. the switch probability, pa) to choose from the global search (i.e. exploration) and local search (i.e. exploitation) is the main strength of FPA as compared to other meta-heuristic algorithms. …”
Get full text
Get full text
Article -
8
PMT : opposition based learning technique for enhancing metaheuristic algorithms performance
Published 2020“…Nevertheless, many metaheuristic algorithms are still suffering from a low convergence rate because of the poor balance between exploration (i.e. roaming new potential search areas) and exploitation (i.e., exploiting the existing neighbors). …”
Get full text
Get full text
Thesis -
9
Naive bayes algorithm based e-mail spamming filtering system
Published 2022Get full text
Get full text
Get full text
Academic Exercise -
10
An adaptive data gathering algorithm for minimum travel route planning in WSNs based on rendezvous points
Published 2019“…MCRP exhibits a relatively close performance to other algorithms with respect to power algorithms.…”
Get full text
Get full text
Get full text
Article -
11
Customer segmentation on clustering algorithms
Published 2023“…Then, k-means, DBSCAN, and GMM clustering algorithms are applied to segment customers based on their buying behaviour. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Dynamic probability selection for flower pollination algorithm based on metropolis-hastings criteria
Published 2021“…Having only one parameter control (i.e. the switch probability, pa) to choose from the global search (i.e. exploration) and local search (i.e. exploitation) is the main strength of FPA as compared to other meta-heuristic algorithms. …”
Get full text
Get full text
Get full text
Article -
13
Experimental implementation controlled SPWM inverter based harmony search algorithm
Published 2023Article -
14
-
15
E4ML: Educational Tool for Machine Learning
Published 2003Get full text
Get full text
Conference or Workshop Item -
16
E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan
Published 2020“…The objective of the project is to design and develop an E-History Malaysian secondary school textbook system using Term Frequency-Inverse Document Frequency (TF-IDF) algorithm with text visualization and also to test the functionality and usability of the system through a web-based system. …”
Get full text
Get full text
Thesis -
17
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
18
An adaptive HMM based approach for improving e-Learning methods
Published 2023“…Both techniques are used to devise an adaptive algorithm which efficiently manages the clustering of students based on their VAK aptitudes and predicts the future e-learning framework for these students. …”
Conference Paper -
19
Designing a new E-Commerce authentication framework for a cloud-based environment
Published 2024Conference Paper -
20
Modeling time series data using Genetic Algorithm based on Backpropagation Neural network
Published 2018“…Based on the results obtained, a better prediction result can be produced by the proposed GA-BPNN learning algorithm.…”
Get full text
Get full text
Thesis
