Search Results - (( based making based algorithm ) OR ( java application matching algorithm ))

Refine Results
  1. 1

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Biogeography based optimization (BBO) algorithm to minimise non-productive time during hole-making process by Tamjidy, Mehran, Paslar, Shahla, Baharudin, B. T. Hang Tuah, Tang, Sai Hong, Mohd Ariffin, Mohd Khairol Anuar

    Published 2015
    “…Tool path optimization in today’s manufacturing systems is one of the crucial issues in holes-making machining. This paper presents an evolutionary optimization algorithm based on geographic distribution of biological organism to deal with hole-making process problem. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    An Interval-Valued Fuzzy Soft Set Based Decision Making Approach Considering Weight by Hongwu, Qin, Ma, Xiuqin

    Published 2014
    “…The algorithm to solve fuzzy decision making problems based on interval-valued fuzzy soft sets has been proposed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Enhanced Bandwidth Based Handover Decision Making Algorithm For Small Cell Wireless Networks by Chung, Seng Kheau, Chua, Bih Lii, Mark Irwin Goh, Syed Shajee Husain, Yew, Hoe Tung, Abbas Ibrahim Mbulwa

    Published 2020
    “…To overcome this problem, this paper proposed a new handover decision making algorithm that integrates the traveling distance prediction technique with the bandwidth based handover algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Comparative Study of Weighted Product–Dijkstra’s Algorithm and All Possible Path Approach Based on Multiple Criteria and Multi-Dimensions by Ting Kien Hua, Noraini Abdullah

    Published 2020
    “…All Possible Path Algorithm (APPA) was another algorithm that was also used to rank all the alternatives path based on multiple criteria. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Application of induced preorderings in score function-based method for solving decision-making with interval-valued fuzzy soft information by Ali, Mabruka, Kilicman, Adem, Khameneh, Azadeh Zahedi

    Published 2021
    “…Currently, there are three interval-valued fuzzy soft set-based decision-making algorithms in the literature. …”
    Get full text
    Get full text
    Article
  12. 12

    Malaysia Constitutional Law System, Study On The Use Advanced Searching Algorithm (Rule-Based And Horspool Algorithm) by Abd Razak, Nuur Farhani

    Published 2017
    “…In this research, we study about the concept of advanced searching algorithm to build an intelligent web based system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Dam haji game using A* search algorithm / Siti Farah Najwa Mukhlis by Mukhlis, Siti Farah Najwa

    Published 2017
    “…The results of this project is a Dam Haji game using A* algorithm which it is able to make legal movements based on the game’s rules and a matchup with a computer-based player that have gone through a process of computer learning to make movement based on the A* shortest path technique. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks by Zarafshan, Faraneh

    Published 2015
    “…This method makes a tradeoff between token-based and permission-based. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Movie recommendation using user-based collaborative filtering algorithm / Nur Ayuni Izlin Mat Ishor by Mat Ishor, Nur Ayuni Izlin

    Published 2019
    “…This prototype is very helpful for them making a decision based on the suggestion as display by the prototype of this project.…”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    TRIP PLANNER MOBILE APPLICATION FOR SARAWAK TOURIST WITH USING INTELLIGENT AGENT BASED DECISION MAKING ALGORITHMS by Teh, Khee Shin

    Published 2020
    “…Thus, the proposed system which is trip planner mobile application for Sarawak tourist with using intelligent agent based decision making algorithms may help to resolve the problem. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  19. 19

    A priority based job scheduling algorithm in cloud computing by Shamsollah, Ghanbari, Othman, Mohamed

    Published 2012
    “…The proposed algorithm is based on multiple criteria decision making model.…”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20