Search Results - (( developing based cp algorithm ) OR ( java implication tree algorithm ))
Search alternatives:
- developing based »
- java implication »
- implication tree »
- tree algorithm »
- cp algorithm »
- based cp »
-
1
Conceptual framework for lightweight ciphertext policy-attribute based encryption scheme for internet of things devices / Norhidayah Muhammad and Jasni Mohamad Zain
Published 2019“…Therefore we propose a lightweight Ciphertext Policy-Attribute Based Encryption (CP-ABE) algorithm to implement in IoT devices. …”
Get full text
Get full text
Get full text
Article -
2
Cloud Resource Management Framework Using Monarch Butterfly Harmony Search And Case Based Reasoning
Published 2017“…In addition, a new ri is developed using case-based reasoning and is then plugged into the rop framework. …”
Get full text
Get full text
Thesis -
3
Fault location in unbalanced distribution system including distributed generation units using multi-layer feed forward neural network
Published 2014“…Fault location finding process in distribution network is totally different based on the application of developed algorithms for the transmission lines due to characteristics of distribution system. …”
Get full text
Get full text
Thesis -
4
Specific heat capacity extraction of soybean oil/mxene nanofluids using optimized long short-term memory
Published 2024“…Maximum specific heat capacity nanofluids (cpNF) augmentation is 24.49% at 0.125 wt.% loading of Ti3C2 in the base oil. …”
Get full text
Get full text
Get full text
Article -
5
Scalable workflow scheduling algorithm for minimizing makespan and failure probability
Published 2019“…Based on the simulation results, the proposed algorithm has improved the overall workflow scheduling effectiveness in comparison with existing algorithms.…”
Get full text
Get full text
Get full text
Get full text
Article -
6
Some Metaheuristics for Tourist Trip Design Problem
Published 2023“…We also compared the proposed method with the Posteriority approach to MOP. The results show that CP-based algorithms are superior to NSGA-II in finding a Pareto frontier. …”
Get full text
Get full text
Conference or Workshop Item -
7
Fault detection and diagnosis using correlation coefficients
Published 2005“…This research is to formulate a FDD algorithm based on MSPC via correlation coefficients. …”
Get full text
Get full text
Thesis -
8
PLL-less SRF technique for operation of SAPF under unbalanced and distorted supply voltage
Published 2018Get full text
Get full text
Conference or Workshop Item -
9
-
10
Nonlinear convergence algorithm: structural properties with doubly stochastic quadratic operators for multi-agent systems
Published 2018“…We develop two algorithms: 1) the nonlinear algorithm of extreme doubly stochastic quadratic operator (NLAEDSQO) to generate all the convergent EDSQOs and 2) the nonlinear convergence algorithm (NLCA) of EDSQOs to investigate the optimal consensus for MAS. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
11
Secure lightweight client for cloud-based E-Health Model
Published 2023“…Thirdly, an authorization algorithm named federated proxy implements for fine-grained access control based on CP-ABE (FPI-CP-ABE) is proposed. …”
Get full text
Get full text
Get full text
Thesis -
12
The application of firefly algorithm in an adaptive emergency evacuation centre management (AEECM) for dynamic relocation of flood victims
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Inverse kinematic solution in handling 3R manipulator via real-time genetic algorithm
Published 2023Conference paper -
14
T-way strategy for sequence input interactions test case generation adopting fish swarm algorithm
Published 2019“…Since twenty years many useful t-way strategies have been developed to reduce test case size. In order to reduce test cases several T-way sequence input interaction strategies are explored, such as, Bee Algorithm(BA), Kuhn encoding (K) , ASP with Clasp , CP with Sugar, Erdem (ER) exact encoding, Tarui (TA) Method, U, UR, D and DR, Brain (BR). …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Feedforward neural network for solving particular fractional differential equations
Published 2024“…Then, a single hidden layer of FNN based on Chelyshkov polynomials with an extreme learning machine algorithm (SHLFNNCP-ELM) is constructed for solving FDEsC. …”
Get full text
Get full text
Get full text
Thesis -
16
Parametric and Semiparametric Competing Risks Models for Statistical Process Control with Reliability Analysis
Published 2004“…The Expectation Maximization (EM) algorithm is utilized to obtain the estimate of the parameters in the models. …”
Get full text
Get full text
Thesis -
17
-
18
-
19
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…Some schemes have been proposed to deliver such access control using Ciphertext-policy attribute-based encryption (CP-ABE) that can enforce data owners’ access policies to achieve such cryptographic access control and tackle the majority of those concerns. …”
Get full text
Get full text
Thesis -
20
Prediction of meteorological drought and standardized precipitation index based on the random forest (RF), random tree (RT), and Gaussian process regression (GPR) models
Published 2024“…A different combination of machine learning models and variables has been performed for the forecasting of metrological drought based on the SPI-6 and 12�months. Models were developed using monthly rainfall data for the period of 2000�2019 at two meteorological stations, namely, Karanjali and Gangawdi, each representing a geographical region of Upper Godavari river basin area in the central India of Maharashtra state which frequently experiences droughts. …”
Article
