Search Results - (( developing agent function algorithm ) OR ( java data protection algorithm ))

Refine Results
  1. 1

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…The second agent is a reliability evaluation agent that uses a recursive algorithm to predict the suitability generator based on the frequency and duration reliability indices in each state while the third agent is the storage and transfer of data between the other two agents. …”
    Get full text
    Get full text
    Thesis
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  4. 4

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Optimization of multi-agent traffic network system with Q-Learning-Tune fitness function by Tan, Min Keng

    Published 2019
    “…However, the evaluation function used in the AI is developed based on historical traffic data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Development of gene motif modulation for information processing in artificial DNA computing by Shamsudin, Ahmad Faizul, Suhaimi, Mohd Adam, Ibrahim Ali , Noorbatcha, Hussin, Ummu Salamah, A. F., Alya Khadijah, D., Nor Hidayah

    Published 2014
    “…In the artificial DNA computing model, the MAS (Multi-Agent System) algorithm depicts the sender agent transmits moleware information through the control agent which is then converted to binary data as input to the receiver agent. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9
  10. 10

    Development of a Negotiation Support Model for Value Management in Construction by UTOMO, CHRISTIONO

    Published 2009
    “…The research objectives are to find a theoretical basis and research approach for negotiation support methodology on VM, to develop a decision model for technical solution options in a satisfying function/cost preferences, to investigate negotiation style and outcome and analyze the correlation between them for the basis of scenarios on the agent system, to develop a model for agreement options and coalition algorithms on value-based decision, to validate the coalition algorithms and introduce an initial model of Negotiation Support for Value Management (NSVM). …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Reinforcement learning-based target tracking for unmanned aerial vehicle with achievement rewarding and multistage traning by Ahmed Abo Mosali, Najm Addin Mohammed

    Published 2022
    “…Fifth, a novel agent selection algorithm was developed to enable the selection of the best agent and avoid under-fitting and over-fitting. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Estimation-based Metaheuristics: A New Branch of Computational Intelligence by Nor Hidayati, Abd Aziz, Zuwairie, Ibrahim, Saifudin, Razali, Nor Azlina, Ab. Aziz

    Published 2016
    “…Besides biology, physics and chemistry, state estimation algorithm also has become a source of inspiration for developing metaheuristic algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Iteration strategy and ts effect towards the performance of population based metaheuristics by Nor Azlina, Ab. Aziz, Nor Hidayati, Abdul Aziz, Azlan, Abd Aziz, Tasiransurini, Abdul Rahman, Wan Zakiah, Wan Ismail, Zuwairie, Ibrahim

    Published 2020
    “…The algorithms can be categorized based on number of agents, either single agent algorithms which are also known as single solution metaheuristics or multi agents algorithms, also known as population-based metaheuristics. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…Hiding data provides a good layer of protection on the secret message, so the purpose of this thesis is to study the data hiding techniques in digital images as a new and powerful technology capable of solving important practical problems. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Automated bilateral negotiation with incomplete information in the e-marketplace. by Jazayeriy, Hamid

    Published 2011
    “…Moreover, results indicate that agents equipped by this learning capability can generate Pareto-efficient offers by MGT algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    CSGO: a game-inspired metaheuristic algorithm for global optimization by Rahman, Tuan A. Z., Md Rezali, Khairil Anas, As'arry, Azizan

    Published 2023
    “…This paper presents a video game-inspired meta-heuristic algorithm and its performance evaluation. This optimizer algorithm is developed by assembling impressive features of previous well-known optimizer algorithms such as stochastic fractal search (SFS), artificial gorilla troops optimizer (GTO) and marine predators algorithm (MPA) with addition of chaotic operators. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Improved smoothed functional algorithmsoptimized pid controller for efficient speed regulation of wind turbines by Mohd Ashraf, Ahmad, Yoganathan, G., Muhammad Ikram, Mohd Rashid, Hao, Mok Ren, Mohd Zaidi, Mohd Tumari

    Published 2025
    “…This study introduces a novel approach for PID controller tuning in wind turbine systems using single-agent optimization methods, specifically the memory smoothed functional algorithm (MSFA) and norm-limited smoothed functional algorithm (NL-SFA). …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A modified crow search algorithm with niching technique for numerical optimization by Islam, J., Vasant, P.M., Negash, B.M., Watada, J.

    Published 2019
    “…The search agent of the primitive crow search algorithm does not always follow the best solution obtained so far. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    A modified crow search algorithm with niching technique for numerical optimization by Islam, J., Vasant, P.M., Negash, B.M., Watada, J.

    Published 2019
    “…The search agent of the primitive crow search algorithm does not always follow the best solution obtained so far. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20