Search Results - (( based sharing modified algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- sharing modified »
- java implication »
- based sharing »
-
1
-
2
Embedded Ethernet System For Real-Time Communication
Published 2018“…MATLAB, Simulink, and Stateflow are used for the Ethernet network model simulation. Based on the simulation, EIED backoff algorithm gave better performance in term of average delay compare to other algorithms. …”
Get full text
Get full text
Monograph -
3
Optimizing Decentralized Exam Timetabling with a Discrete Whale Optimization Algorithm
Published 2025“…This paper presents a novel discrete Whale Optimization Algorithm approach, integrating the strengths of population-based and local-search algorithms for addressing the examination timetabling problem, a significant challenge many educational institutions face. …”
Get full text
Get full text
Get full text
Article -
4
Optimizing decentralized exam timetabling with a discrete whale optimization algorithm
Published 2025“…This paper presents a novel discrete Whale Optimization Algorithm approach, integrating the strengths of population-based and local-search algorithms for addressing the examination timetabling problem, a significant challenge many educational institutions face. …”
Get full text
Get full text
Get full text
Article -
5
An enhanced sequential exception technique for semantic-based text anomaly detection
Published 2019“…If these challenges are not properly resolved, identifying semantic-based text anomaly will be less accurate. This study proposes an Enhanced Sequential Exception Technique (ESET) to detect semantic-based text anomaly by achieving five objectives: (1) to modify Sequential Exception Technique (SET) in processing unstructured text; (2) to optimize Cosine Similarity for identifying similar and dissimilar text data; (3) to hybridize modified SET with Latent Semantic Analysis (LSA); (4) to integrate Lesk and Selectional Preference algorithms for disambiguating senses and identifying text canonical form; and (5) to represent semantic-based text anomaly using First Order Logic (FOL) and Concept Network Graph (CNG). …”
Get full text
Get full text
Get full text
Thesis -
6
Computational intelligence based power tracing for nondiscriminatory losses charge allocation and voltage stability improvement. / Zulkifli Abdul Hamid
Published 2013“…Subsequently, the developed tracing algorithm was modified in the context of stability index tracing……”
Get full text
Get full text
Book Section -
7
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…This thesis focuses on the fair share of excess bandwidth distribution among aggregates flow; First, analyse the effect of aggregate based marking schemes on the fair sharing of excess bandwidth among aggregates. …”
Get full text
Get full text
Thesis -
8
-
9
Estimation Of Weibull Parameters Using Simulated Annealing As Applied In Financial Data
Published 2023“…The finding reveals that the Weibull distribution is well-suited to describing the investment behaviour of the MPS based on the estimates via the SA algorithm. Therefore, purchasing shares in this sector is very attractive for a long-term investment period, but may have a high risk of committing it as a result of fluctuations in the mean and variance of the estimate. …”
Get full text
Get full text
Thesis -
10
QTCP: an optimized and improved congestion control algorithm of high-speed TCP networks
Published 2011“…To overcome these problems Quick Transport Control Protocol (QTCP) algorithm based on optimizations of HS-TCP slow start algorithm and Additive Increase and Multiplicative Decrease (AIMD) algorithm have been proposed. …”
Get full text
Get full text
Conference or Workshop Item -
11
-
12
Security analysis of data transmission in an IoT based platform for telemedicine
Published 2021“…This study proposes a modified folded pipeline architecture for resource restriction applications with an AES algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Reduced latency in restricted flooding routing protocol for mobile ad hoc network.
Published 2007“…This paper presents Quadrant-based directional routing protocol (Q-DIR) algorithm that restrict the broadcast region to a quadrant where the destination node and source node are located. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Artificial bee colony for inventory routing problem with backordering
Published 2014“…We modify the standard ABC algorithm by incorporating the inventory and backorder information and, a new inventory updating mechanism incorporating the forward and backward transfers. …”
Get full text
Get full text
Conference or Workshop Item -
15
-
16
Computational intelligence based power tracing for non discriminatory losses charge allocation and voltage stability improvement / Zulkiffli Abdul Hamid
Published 2013“…Subsequently, the developed tracing algorithm was modified in the context of stability index tracing. …”
Get full text
Get full text
Thesis -
17
Computational intelligence based power tracing for non discriminatory losses charge allocation and voltage stability improvement / Zulkiffli Abdul Hamid
Published 2013“…Subsequently, the developed tracing algorithm was modified in the context of stability index tracing. …”
Get full text
Get full text
Thesis -
18
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
19
A hybrid cryptosystem for biometric authentication and template protection
Published 2017“…The multibiometric dataset is constructed based on the fusion of756 face images and 756 iris images of 108 subjects. …”
Get full text
Get full text
Thesis -
20
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The study recommends to use another type of digital signature algorithm to be used in the proposed method. Another recommendation is to modify and optimise the python coding in the study to be more robust and suitable for real world application.…”
Get full text
Get full text
Student Project
