Search Results - (( developing information new algorithm ) OR ( java adaptation optimization algorithm ))

Refine Results
  1. 1
  2. 2

    Monolingual and Cross-language Information Retrieval Approaches for Malay and English Language Document by Abdullah, Muhamad Taufik

    Published 2006
    “…The results show that there is an improvement in performance from non-stemmed Malay to stemmed Malay, and also from previous stemming algorithm to the new stemming algorithm. Since the employment of the new stemming algorithm and approaches achieved good performance results in Malay monolingual information retrieval, a Malay-English cross-language information retrieval experiment has been performed. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    C4.5 Algorithm Application for Prediction of Self Candidate New Students in Higher Education by Erlan, Darmawan

    Published 2018
    “…System development methodology is used the waterfall model.…”
    Get full text
    Get full text
    Journal
  8. 8

    The normalized random map of gradient for generating multifocus image fusion by Ismail, ., Kamarul Hawari, Ghazali

    Published 2020
    “…Many researchers have developed many new and sophisticated methods. They show complicated computation and algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Mobile Map-Based Positioning System Using Segmentation Algorithm (MM-BPS) by Migdady, Hazem Moh'd Ali

    Published 2008
    “…Vaishnavi and Kuechler Methodology has been implemented in various applications and it considered as a general methodology to develop totally new algorithms and create new information according to the accumulated information. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    A new 128-bit block cipher by Mohd Ali, Fakariah Hani

    Published 2009
    “…This block cipher is suitable to be applied to small devices such as mobile phones and PDAs. The existence of this new 128-bit block cipher algorithm will increase the protection of the national information infrastructure and also will contribute as an alternative to other cryptographic algorithms in security in the computing industry.…”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM) by Shuwandy, Moceheb Lazam

    Published 2012
    “…However, this method needs to be develops and supports the protection of information. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Tracking The Eyes Using Interdependence Mean Shift Tracking Algorithm With Appropriate Information Provided by Masrullizam, Mat Ibrahim, Syafeeza, Ahmad Radzi, Soraghan, John

    Published 2016
    “…Most of the developed eyes tracking algorithm are not considered the condition of the eyes that would provide the appropriate information to be used in the processes of the facial analysis algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Methods of intrusion detection in information security incident detection: a comparative study by Tan, Fui Bee, Yau, Ti Dun, M. N. M., Kahar

    Published 2018
    “…Focus will be given to research that have produced new intrusion detection algorithms, framework and model as well as their gaps in the research. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2012
    “…Therefore for this study we try to create a new lightweight algorithm for mobile device, we want to implement identity based encryption with new feature, suitable for mobile device specification. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    ABC: android botnet classification using feature selection and classification algorithms by Abdullah, Zubaile, Mohd Saudi, Madihah, Anuar, Nor Badrul

    Published 2017
    “…In this paper, a new approach for Android botnet classification based on features selection and classification algorithms is proposed. …”
    Get full text
    Get full text
    Article
  20. 20