Search Results - (( construct validity cloud algorithm ) OR ( java adaptation optimization algorithm ))
Search alternatives:
- adaptation optimization »
- construct validity »
- cloud algorithm »
- java adaptation »
-
1
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
2
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. The performance of the recommended approach makes it possible to thwart an attack using brute force considerably more fast than is possible with the encryption technologies that are currently in use. …”
Get full text
Get full text
Get full text
Thesis -
3
Integrated examination and analysis model for improving mobile cloud forensic investigation
Published 2022“…FEDO facilitates cloud evidence by examining the key features and indexing the evidence. …”
Get full text
Get full text
Thesis -
4
Surface reconstruction using grayscale analysis / Nur Hamizah Hamid
Published 2012“…The test results and analysis validate the ability of the proposed solution to provide accurate 3D frontal facial model with low cost.…”
Get full text
Get full text
Thesis -
5
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…In this study, the Deep Belief Network algorithm was optimized and constructed to design an effective NIDS anomaly model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Stereo Camera-Based Aerial Target Geolocation in a Ground-Based Platform Environment
Published 2024thesis::master thesis -
8
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…In addition, a proof of concept is constructed to validate the proposed multi-factor Kerberos authentication using Java programming language. …”
Get full text
Get full text
Thesis
