Search Results - (( developing effective computing algorithm ) OR ( java generation learning algorithm ))
Search alternatives:
- effective computing »
- computing algorithm »
- generation learning »
- learning algorithm »
- java generation »
-
1
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The project objectives includes:(i) To investigate lightweight message encryption algorithms by benchmarking their efficiency in terms of computation speed and generated cipher text size; (ii) To design and develop the TalkOut mobile application with lightweight message encryption by using prototype software development model.; and (iii) To evaluate the usability performance of the developed proposed TalkOut mobile application using System Usability Scale (SUS) approach. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
Object-Oriented Programming semantics representation utilizing agents
Published 2011“…A formal algorithm that can be applied to any two related Java-based source codes examples is invented to generate the semantics of these source codes. …”
Get full text
Get full text
Get full text
Article -
3
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. Features selection process can be considered a problem of global combinatorial optimization in machine learning. …”
Get full text
Get full text
Thesis -
4
CSC126 - Fundamentals of Algorithms and Computer Problem Solving / Faculty of Computer And Mathematical Sciences
Published 2023“…In the end they are expected to develop the ability to analyze simple problems, organize effective algorithmic solutions for the problems and write computer programs to solve them.…”
Get full text
Get full text
Get full text
Teaching Resource -
5
Performance-aware cost-effective brokering and load balancing algorithms for data center in large scale cloud computing
Published 2015“…In order to make our proposed method cost efficient, we developed Load Aware Over Cost algorithm which is 8% cost effective comparing with Load Aware algorithm. …”
Get full text
Get full text
Thesis -
6
Development of symbolic algorithms for certain algebraic processes
Published 2007Get full text
Get full text
Get full text
Monograph -
7
Development of symbolic algorithms for certain algebraic processes
Published 2007Get full text
Get full text
Get full text
Monograph -
8
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Three-dimensional coverage control for multi-unmanned aerial vehicle
Published 2024“…This study proposes a 3D coverage control algorithm to address complex real-world scenarios, wherein the 3D control algorithm will be developed based on the 2D MBC scheme. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
-
11
Human emotion recognition for computer games player using AdaBoost algorithm / Muhamad Nur Adhwa Muhamad Shukri
Published 2017“…In conclusion, this application was developed in order to help computer games player make the best decision before purchasing a computer game on market. …”
Get full text
Get full text
Thesis -
12
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…The issue is not only to develop new algorithms, but also to evaluate them on an experimental computational grid, using synthetic and real workload traces, along with the other existing job scheduling algorithms. …”
Get full text
Get full text
Thesis -
13
-
14
A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC)
Published 1999Get full text
Get full text
Get full text
Proceeding Paper -
15
-
16
A block cipher based on genetic algorithm
Published 2016“…The development of block ciphers have resulted in a number of cryptographic algorithms such as, AES, ARIA, BLOWFISH256, DESL, 3D-AES and many more. …”
Get full text
Get full text
Get full text
Thesis -
17
A genetic similarity algorithm for searching the Gene Ontology terms and annotating anonymous protein sequences
Published 2008“…The computational results and comparison with other related tools are presented to show the effectiveness of the proposed algorithm and tools.…”
Get full text
Get full text
Get full text
Article -
18
Visualization Tool for Pathfinding Algorithms
Published 2023Get full text
Get full text
Final Year Project Report / IMRAD -
19
Multilevel optimization for dense motion estimation
Published 2011“…We evaluated the performance of different optimization techniques developed in the context of optical flow computation with different variational models.In particular, based on truncated Newton methods (TN) that have been an effective approach for large-scale unconstrained optimization, we developed the use of efficient multilevel schemes for computing the optical flow.More precisely, we evaluated the performance of a standard unidirectional multilevel algorithm - called multiresolution optimization (MR/Opt), to a bidrectional multilevel algorithm - called full multigrid optimization (FMG/Opt).The FMG/Opt algorithm treats the coarse grid correction as an optimization search direction and eventually scales it using a line search. …”
Get full text
Get full text
Get full text
Monograph -
20
Development of classification algorithms of human gait
Published 2022“…Thus, this study aims to develop a classification algorithm that can effectively classify subjects with relatively simplified input data. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
