Search Results - (( based sharing modified algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2

    Embedded Ethernet System For Real-Time Communication by Thiagarajan, Durgesh

    Published 2018
    “…MATLAB, Simulink, and Stateflow are used for the Ethernet network model simulation. Based on the simulation, EIED backoff algorithm gave better performance in term of average delay compare to other algorithms. …”
    Get full text
    Get full text
    Monograph
  3. 3

    Optimizing Decentralized Exam Timetabling with a Discrete Whale Optimization Algorithm by Emily Siew, Sing Kiang, Sze, San Nah, Goh, Say Leng

    Published 2025
    “…This paper presents a novel discrete Whale Optimization Algorithm approach, integrating the strengths of population-based and local-search algorithms for addressing the examination timetabling problem, a significant challenge many educational institutions face. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Optimizing decentralized exam timetabling with a discrete whale optimization algorithm by Emily Sing Kiang Siew, San nah sze, Say leng goh

    Published 2025
    “…This paper presents a novel discrete Whale Optimization Algorithm approach, integrating the strengths of population-based and local-search algorithms for addressing the examination timetabling problem, a significant challenge many educational institutions face. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    An enhanced sequential exception technique for semantic-based text anomaly detection by Taiye, Mohammed Ahmed

    Published 2019
    “…If these challenges are not properly resolved, identifying semantic-based text anomaly will be less accurate. This study proposes an Enhanced Sequential Exception Technique (ESET) to detect semantic-based text anomaly by achieving five objectives: (1) to modify Sequential Exception Technique (SET) in processing unstructured text; (2) to optimize Cosine Similarity for identifying similar and dissimilar text data; (3) to hybridize modified SET with Latent Semantic Analysis (LSA); (4) to integrate Lesk and Selectional Preference algorithms for disambiguating senses and identifying text canonical form; and (5) to represent semantic-based text anomaly using First Order Logic (FOL) and Concept Network Graph (CNG). …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Computational intelligence based power tracing for nondiscriminatory losses charge allocation and voltage stability improvement. / Zulkifli Abdul Hamid by Abdul Hamid, Zulkifli

    Published 2013
    “…Subsequently, the developed tracing algorithm was modified in the context of stability index tracing……”
    Get full text
    Get full text
    Book Section
  7. 7

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…This thesis focuses on the fair share of excess bandwidth distribution among aggregates flow; First, analyse the effect of aggregate based marking schemes on the fair sharing of excess bandwidth among aggregates. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Estimation Of Weibull Parameters Using Simulated Annealing As Applied In Financial Data by Hamza, Abubakar

    Published 2023
    “…The finding reveals that the Weibull distribution is well-suited to describing the investment behaviour of the MPS based on the estimates via the SA algorithm. Therefore, purchasing shares in this sector is very attractive for a long-term investment period, but may have a high risk of committing it as a result of fluctuations in the mean and variance of the estimate. …”
    Get full text
    Get full text
    Thesis
  10. 10

    QTCP: an optimized and improved congestion control algorithm of high-speed TCP networks by Qureshi, Barkatullah, Othman, Mohamed, K. Subramaniam, Shamala, Abdul Hamid, Nor Asilah Wati

    Published 2011
    “…To overcome these problems Quick Transport Control Protocol (QTCP) algorithm based on optimizations of HS-TCP slow start algorithm and Additive Increase and Multiplicative Decrease (AIMD) algorithm have been proposed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Security analysis of data transmission in an IoT based platform for telemedicine by Olanrewaju, Rashidah Funke, Amuda, Idowu Rahaman, Hassan Abdalla Hashim, Aisha

    Published 2021
    “…This study proposes a modified folded pipeline architecture for resource restriction applications with an AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Reduced latency in restricted flooding routing protocol for mobile ad hoc network. by A. Latif, Liza, Ali, A., Fisal, Norsheila

    Published 2007
    “…This paper presents Quadrant-based directional routing protocol (Q-DIR) algorithm that restrict the broadcast region to a quadrant where the destination node and source node are located. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Artificial bee colony for inventory routing problem with backordering by Moin, N.H., Halim, H.Z.A.

    Published 2014
    “…We modify the standard ABC algorithm by incorporating the inventory and backorder information and, a new inventory updating mechanism incorporating the forward and backward transfers. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    A hybrid cryptosystem for biometric authentication and template protection by Jegede, Abayomi Joshua

    Published 2017
    “…The multibiometric dataset is constructed based on the fusion of756 face images and 756 iris images of 108 subjects. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The study recommends to use another type of digital signature algorithm to be used in the proposed method. Another recommendation is to modify and optimise the python coding in the study to be more robust and suitable for real world application.…”
    Get full text
    Get full text
    Student Project