Search Results - (( developing organizations calling algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    An Adaptive Fuzzy Symbiotic Organisms Search Algorithm and Its Applications by Nurul Asyikin, Zainal, Azad, Saiful, Kamal Z., Zamli

    Published 2020
    “…This paper discusses the development of a Symbiotic Organisms Search Algorithm (SOS) variant, called Adaptive Fuzzy SOS (FSOS). …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Stochastic process and tutorial of the African buffalo optimization by Odili, Julius Beneoluchi, Noraziah, Ahmad, Alkazemi, Basem, Zarina, M.

    Published 2022
    “…Organizing their large herds that could be over a thousand buffalos using just two principal sounds, the /maaa/ and the /waaa/ calls present a good foundation for the development of an optimization algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant by Agarwal, Praveen, Singh, Amandeep, Kilicman, Adem

    Published 2018
    “…Advanced encryption standard is an encryption algorithm which is widely used to provide security to sensitive information by organizations. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Stochastic process and tutorial of the African bufalo optimization by Odili, Julius Beneoluchi, Noraziah, Ahmad, Alkazemi, Basem Y., M., Zarina

    Published 2022
    “…Organizing their large herds that could be over a thousand buffalos using just two principal sounds, the /maaa/ and the /waaa/ calls present a good foundation for the development of an optimization algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Prime-based method for interactive mining of frequent patterns by Nadimi-Shahraki, Mohammad-Hossein

    Published 2010
    “…Moreover, this study introduces a mining algorithm called PC-miner to mine the mining model frequently with various values of minsup. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm by Diallo, Alhassane Saliou, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE) as software and a Bluetooth (BT) Shield connected to an Arduino Uno R3 boards as hardware. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Early autism spectrum disorder detection using machine learning / Muhammad Shahmi Shahron Nizan by Shahron Nizan, Muhammad Shahmi

    Published 2023
    “…This project aims to develop a web-based application utilizing the Random Forest Classification Algorithm to aid concerned parents in detecting potential Autism Spectrum Disorder (ASD) symptoms in their children aged 1-6 years in Malaysia. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Evolutionary genetic algorithm as a generative tools in identifying Malay, Chinese and Indian cultural product DNA / Izzuddinazwan Misri by Misri, Izzuddinazwan

    Published 2015
    “…This thesis presents an inquiry into the hybrid cross-cultural features of 3 majority races in Malaysia such the Malay, Chinese, and Indian using optimization tools called Genetic Algorithm in order to achieve new design DNA. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
    Get full text
    Get full text
    Thesis
  13. 13

    An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar by Jaafar, Siti Aisyah

    Published 2021
    “…Therefore, in this research, the first objective is to develop an algorithm for a remote AR-IoT monitoring system. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Characterisation of essential proteins in proteins interaction networks by Sakhinah Abu Bakar, Javid Taheri, Albert Y Zomaya

    Published 2013
    “…The proposed method, namely EP3NN (Essential Proteins Prediction using Probabilistic Neural Network), employed a machine learning algorithm called Probabilistic Neural Network as a classifier to identify essential proteins of the organism of interest. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Analysis and modeling of database storage optimization power consumption usage for green data centers by Wan Noor Hamiza, Wan Ali

    Published 2014
    “…The proxies can be discovered by using a developed algorithm of functional dependencies (FDs) called as TANE algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing by Elrasheed Ismail, Sultan

    Published 2013
    “…Secondly, this thesis proposes job-combination based static algorithm for load balancing where all jobs should organized into the standard job combinations, each task of which consists of one to four jobs. …”
    Get full text
    Thesis
  17. 17

    Random traveling wave pulse coupled oscillator (RTWPCO) algorithm of energy-efficient wireless sensor networks by Al-Mekhlafi, Zeyad Ghaleb Aqlan, Mohd Hanapi, Zurina, Othman, Mohamed, Ahmad Zukarnain, Zuriati, Shamsan Saleh, Ahmed M.

    Published 2018
    “…To avert this problem, this study proposes a new mechanism called random traveling wave pulse-coupled oscillator algorithm, which is a self-organizing technique for energy-efficient wireless sensor networks using the phase-locking traveling wave pulse-coupled oscillator and random method on anti-phase of the pulse-coupled oscillator model. …”
    Get full text
    Get full text
    Article
  18. 18

    Blind signature / Musfirah Mohd Ali by Musfirah, Mohd Ali

    Published 2005
    “…In this thesis the author introduce a cryptographic construct called Blind Signature. This thesis is enhanced from digital signature system. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Optimized scheme for efficient and scalable key management in IEEE 802.16e-based networks by Sadeghi, Mohammad Mehdi Gilanian

    Published 2015
    “…Next, an enhanced version of the proposed Scalable and Efficient Key Management Protocol called extended SEKMP (E-SEKMP) is developed based on SEKMP. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Dual authentication for bluetooth connection by Saliou, Diallo Alhassane, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE) as software and a Bluetooth (BT) Shield connected to an Arduino Uno R3 boards as hardware. …”
    Get full text
    Get full text
    Get full text
    Article