Search Results - (( developing sharing generation algorithm ) OR ( java implication force algorithm ))

Refine Results
  1. 1

    Enhance efficiency of answering XML keyword query using incompact structure of MCCTree by Sazaly, Ummu Sulaim

    Published 2012
    “…This study proposes a new algorithm, namely XMCCTreeGenerator, to enhance the efficiency of the CGTree- MCCTreeGenerator. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Secret sharing scheme for key management of secure data sharing in cloud by Abd Majid, Noorhafezan

    Published 2019
    “…Further testing proves that Shamir's Secret Sharing Scheme is more appropriate for large-scale users covering key generation and thresholds to ensure data is completely secure. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Enhanced Harris's Hawk algorithm for continuous multi-objective optimization problems by Yasear, Shaymah Akram

    Published 2020
    “…Harris’s hawk multi-objective optimizer (HHMO) algorithm is a MOSIbased algorithm that was developed based on the reference point approach. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Student resource exchange: a web-based system for sharing educational resources among students by Saw, Hui Loo

    Published 2025
    “…This project focuses on the development of the Student Resource Exchange, a web-based platform designed to enhance the sharing and accessibility of educational resources among students. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Backtracking search algorithm for optimal power dispatch in power system / Mostafa Modiri Delshad by Mostafa, Modiri Delshad

    Published 2016
    “…The goal is to determine the most optimal power sharing among the generating units in a power system. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Mathematical modelling on communication between two parties / Nor Anees Asyiqin Md Disa, Khairunnisa Munawarah Khairul Anwar and Aniesa Farhana Mazlan by Md Disa, Nor Anees Asyiqin, Khairul Anwar, Khairunnisa Munawarah, Mazlan, Aniesa Farhana

    Published 2022
    “…Kuwakado scheme (2018) had be summarized in key generation, encryption, and decryption algorithm. In this study, point m = (2,4) is chosen since it exists on the elliptic curve and will be calculated until 11G using double-and-add algorithm. …”
    Get full text
    Get full text
    Student Project
  7. 7

    Modified spectral clustering algorithm for semisupervised face annotation modeling by Sheng, Gao You

    Published 2025
    “…To improve accuracy, an optimized similarity matrix was developed. It also integrated MustLink (ML) and Cannot-Link (CL) constraints, generated efficiently via the Label Propagation Algorithm (LPA) enhanced by combining Share Nearest Neighbour (SNN) and Radial Basis Function (RBF). …”
    Get full text
    Get full text
    Thesis
  8. 8

    An Effective Power Dispatch Strategy for Clustered Microgrids While Implementing Optimal Energy Management and Power Sharing Control Using Power Line Communication by Ahmed Mohamed, Ahmed Haidar, Adila, Fakhar, Kashem M., Muttaqi

    Published 2020
    “…Thisarticle proposes an effective power dispatch strategy for clusteredmicrogrids. The developed hybrid algorithm implements optimalenergy management and power sharing control using binary data.The frequency-shift keying (FSK) technique has been adoptedfor transmitting the binary signal over the power line commu-nication (PLC). …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Multiobjective evolutionary algorithms NSGA-II and NSGA-III for software product lines testing optimization by Jamil, Muhammad Abid, Alhindi, Ahmad, Arif, Muhammad, Nour, Mohamed K, Awang Abu Bakar, Normi Sham, Aljabri, Tareq Fahad

    Published 2020
    “…Software Product line (SPL) engineering methodology utilizes reusable components to generate a new system for a specific domain. In fact, the product line establishes requirements, reusable components, architecture, and shared products to develop new products’ functionalities. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Fruit-Fly Based Searching Algorithm For Cooperative Swarming Robotic System by Abidin, Zulkifli Zainal

    Published 2013
    “…In this thesis, a simple framework and methodology in developing a bio-inspired algorithm for cooperative swarming robotic application has been developed. …”
    Get full text
    Get full text
    Thesis
  11. 11

    An Effective Power Dispatch Strategy for Clustered Micro-grids while Implementing Optimal Energy Management and Power Sharing Control using Power Line Communication by Ahmed Mohamed, Ahmed Haidar, Adila, Fakhar, Muttaqi, Kashem M

    Published 2019
    “…This paper proposes an effective power dispatch strategy for clustered micro-grids. The developed hybrid algorithm implements optimal energy management and power sharing control using binary data. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  12. 12

    Resource management algorithms for wavelength division multiplexing optical metro slotted ring networks by Mohammed Abdulrazak, Fuaad Hasan

    Published 2012
    “…Therefore, fair sharing with collision avoidance have to be ensured when MAC protocols are designed. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Computational intelligence based power tracing for nondiscriminatory losses charge allocation and voltage stability improvement. / Zulkifli Abdul Hamid by Abdul Hamid, Zulkifli

    Published 2013
    “…Subsequently, the developed tracing algorithm was modified in the context of stability index tracing……”
    Get full text
    Get full text
    Book Section
  14. 14
  15. 15

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The project objectives includes:(i) To investigate lightweight message encryption algorithms by benchmarking their efficiency in terms of computation speed and generated cipher text size; (ii) To design and develop the TalkOut mobile application with lightweight message encryption by using prototype software development model.; and (iii) To evaluate the usability performance of the developed proposed TalkOut mobile application using System Usability Scale (SUS) approach. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  16. 16

    Constant lock circuit for DC micro-grid system by Mohammed, Asaad Abduljabbar

    Published 2017
    “…Therefore, this thesis develops DC micro-grid control strategies based on providing continuous load power regardless of the generated power and load demand. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    NEUCOMP2 - parallel neural network compiler by Sulaiman, Md. Nasir, Evans, D. J.

    Published 1996
    “…Experiments were carried out to study the performance of the NEUCOMP2 programs for the backpropagation network. NEUCOMP2 was developed and run on the Sequent Balance 8000 computer system at Parallel Algorithm Research Centre, U.K.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Energy Management Strategies for Optimal Hybrid Microgrid Configuration in the Smart Village Context by Fakhar, Adila

    Published 2018
    “…With these aims, an effective power dispatch algorithm has been developed for clustered microgrids incorporating power sharing control using Power Line Communication (PLC). …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20