Search Results - (( developing new needs algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Improvement and performance analysis on statistical selection algorithms by Kweh, Yeah Lun, Othman, Mohamed

    Published 2006
    “…This new algorithm is developed based on the simulation of the real multicast environment. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3
  4. 4

    Extended development of a Computer Aided Detection (CAD) system for brain bleed in CT / Muhammad Illyas Abdul Muhji by Muhammad Illyas, Abdul Muhji

    Published 2018
    “…Having said that the new algorithm still needs improvements so that the CAD able to perform better.…”
    Get full text
    Get full text
    Thesis
  5. 5

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A new algorithm for system of integral equations by Rasulov, Abdujabar, Kilicman, Adem, Eshkuvatov, Zainidin K., Raimova, Gulnora

    Published 2014
    “…We develop a new algorithm to solve the system of integral equations. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar by Jaafar, Mohd Izhar

    Published 2012
    “…The purpose of this study was to design and develop new secure plug-in on Microsoft Outlook using integration of symmetric and asymmetric cryptographic algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    An interactive analytics approach for sustainable and resilient case studies: a machine learning perspective by Mousavi, Seyed Mohsen, Sadeghi R., Kiarash, Lee, Lai Soon

    Published 2023
    “…To integrate machine learning and human interactions, this paper develops a new three-stage interactive algorithm in business analytics, called the interactive Nautilus-based algorithm, to address complex problems. …”
    Get full text
    Get full text
    Article
  10. 10

    AUTOMATIC ROUTE FINDER FOR NEW VISITORS by ADNAN, MOHD SHIHAM

    Published 2006
    “…This project proposes a new visitor route model that is based on shortest path algorithms for road networks. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Performance enhancement of AIMD algorithm for congestion avoidance and control by Jasem, Hayder Natiq

    Published 2011
    “…National Chiao Tung University’s network simulation (NCTUns) has been used in this development to compare the new algorithm with the older versions and determine its advantages over the older versions. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Fast Finite Difference Time Domain Algorithms for Solving Antenna Application Problem by Hasan, Mohammad Khatim

    Published 2008
    “…The objective of the thesis is to develop new sequential and parallel algorithms that are faster than the standard Finite Difference Time Domain method. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Weed recognition based on erosion and dilation segmentation algorithm by S., Sulaiman, M.H., Siddiqi, I., Ahmad

    Published 2009
    “…Currently research is going on for developing new machine vision algorithms for automatic recognition and classification of many divers object groups. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance by Nor Azlan, Nor Asmaa Alyaa

    Published 2021
    “…The thesis was set to three objectives as follows; to develop a new augmentation algorithm of Simplex method from the existed augmentation studies; to integrate the superiorities of the QSM and BLSA algorithms that can enhance computational performance; to compare the performance of the new augmentation algorithm with the conventional Simplex, QSM and BLSA in reducing iteration number. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A Hybrid Adaptive Leadership GWO Optimization with Category Gradient Boosting on Decision Trees Algorithm for Credit Risk Control Classification by Suihai, Chen, Chih How, Bong, Po Chan, Chiu

    Published 2024
    “…The traditional risk control model cannot identify good customers and bad customers well, so a new high precision risk control algorithm model is needed to solve this problem. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Widely linear dynamic quaternion valued least mean square algorithm for linear filtering by Mohammed, Aldulaimi Haydar Imad

    Published 2017
    “…This changing will cause noise amplification and affects the convergence speed. In this thesis, a new quaternion gradient based adaptive algorithm for FIR adaptive filter is developed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Multiobjective evolutionary algorithms NSGA-II and NSGA-III for software product lines testing optimization by Jamil, Muhammad Abid, Alhindi, Ahmad, Arif, Muhammad, Nour, Mohamed K, Awang Abu Bakar, Normi Sham, Aljabri, Tareq Fahad

    Published 2020
    “…Software Product line (SPL) engineering methodology utilizes reusable components to generate a new system for a specific domain. In fact, the product line establishes requirements, reusable components, architecture, and shared products to develop new products’ functionalities. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…In the first experiment, an algorithm called the LB-RSA was developed. A looping process was added to this algorithm in order to produce a new modulo value to make the E-mail entered relative prime to the new modulo value, which helps to produce more E-mail addresses that can be used as public keys. …”
    Get full text
    Get full text
    Thesis