Search Results - (( developing special function algorithm ) OR ( java application status algorithm ))

Refine Results
  1. 1

    Computation of cryptosystem based on Lucas functions using addition chain by Md Ali, Zulkarnain, Othman, Mohamed, Md. Said, Mohamad Rushdan, Sulaiman, Md. Nasir

    Published 2010
    “…Cryptosystem based on Lucas Functions is known as LUC Cryptosystem. Lucas Functions are the special form of second-order linear recurrence relation using a large public integer as modulus. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    A hybrid SP-QPSO algorithm with parameter free adaptive penalty method for constrained global optimization problems by Fatemeh, D. B., Loo, C. K., Kanagaraj, G., Ponnambalam, S. G.

    Published 2018
    “…Most real-life optimization problems involve constraints which require a specialized mechanism to deal with them. The presence of constraints imposes additional challenges to the researchers motivated towards the development of new algorithm with efficient constraint handling mechanism. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    A new cryptosystem analogous to LUCELG and Cramer-Shoup by Muslim, Norliana, Md. Said, Mohamad Rushdan

    Published 2009
    “…Since the encryption and decryption algorithm of a new cryptosystem is based on the defined Lucas function, it is believed that the security of Lucas function is polynomial-time equivalent to the generalized discrete logarithm problems. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Seed disperser ant algorithm for optimization / Chang Wen Liang by Chang , Wen Liang

    Published 2018
    “…The Seed Disperser Ant Algorithm (SDAA) is developed based on the evolution or expansion process of Seed Disperser Ant (Aphaenogaster senilis) colony. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Block multistep methods for solving first order retarded and neutral delay differential equations by Abdul Aziz, Nurul Huda

    Published 2015
    “…The numerical solution of RDDE is then extended for solving the neutral delay differential equations (NDDE) of non-discontinuity and discontinuity cases. A new subroutine function has been added in the developed algorithm with the capabilities to approximate the neutral delay term using the interpolation of function evaluation. …”
    Get full text
    Get full text
    Thesis
  6. 6

    RISC-V instruction set extension on blockchain application by Cheong , Kin Seng

    Published 2024
    “…One of the most common cryptographic algorithms used in blockchain would be selected in this paper, typically djb2 hash algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7
  8. 8

    Alternative method for economic dispatch utilizing grey wolf optimizer by Wong, Lo Ing

    Published 2015
    “…Although several optimization methodologies have been developed for solving ED problems, the complexity of the task reveals the necessity for development of efficient algorithms to accurately locate the optimum solution. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Maximizing Lifetime of Homogeneous Wireless Sensor Network through Energy Efficient Clustering Method by Hasan, Nurul

    Published 2010
    “…The proposed architecture is more scalable and proposed algorithm is robustness against even/uneven node deployment.…”
    Get full text
    Get full text
    Citation Index Journal
  10. 10

    Digitally signed electronic certificate for workshop / Azinuddin Baharum by Baharum, Azinuddin

    Published 2017
    “…Therefore tests can be conducted as you develop the system. From tests, it was observed that all functions perfectly, accurately, and swiftly, indicating the advantages of an E-Certificate system.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik by Abdullah, Abdul Hanan

    Published 2003
    “…WebDID is an alternative method to protect web server by detecting unauthorised changes in web and sending an intrusion alarm directly to web server administrator. Hashing function implementation have been using in this system as its cryptography algorithm. …”
    Get full text
    Get full text
    Monograph
  12. 12
  13. 13

    Dietary supplement of collaborative recommendation system for athlete and fitness enthusiast / Anis Hafiza Gastani, Nur Asyira Naziron and Mohd Taufik Mishan by Gastani, Anis Hafiza, Naziron, Nur Asyira, Mishan, Mohd Taufik

    Published 2024
    “…Assessment through black box testing shows commendable ratings for interface functionalities, reinforcing system reliability. Future recommendations include expanding data scraping techniques and exploring advanced collaborative filtering algorithms for enhanced personalization. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Short Text Classification Using An Enhanced Term Weighting Scheme And Filter-Wrapper Feature Selection by Alsmadi, Issa Mohammad Ibrahim

    Published 2018
    “…In the second stage, grey wolf optimization (GWO) algorithm, a new heuristic search algorithm, uses the SVM accuracy as a fitness function to find the optimal subset feature.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Hybrid evolutionarybarnacles mating optimisation-artificial neural network based technique for solving economic power dispatch planning and operation / Nor Laili Ismail by Ismail, Nor Laili

    Published 2024
    “…The practice of only considering a single objective may affect the operation since only one objective function is considered. Thus, multi-objective needs to be considered to address this issue which considers more than one objective function. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Smart vacuum cleaner using fuzzy logic / Ismalily Ismail by Ismail, Ismalily

    Published 2008
    “…Fuzzy control method and algorithms, including many specialized software and hardware available on the market, may be classified as one type of intelligent control. …”
    Get full text
    Get full text
    Student Project
  18. 18

    Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad by Abd Rahman, Abdullah Sani, Ahmad, Samsiah

    Published 2022
    “…The Website Assurance Monitoring application has been developed based on MD5 hashing technique and SHA26 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Stress mental health symptom assessment mobile application for young adults by Lee, Chun Hoong

    Published 2023
    “…Before this stage, the KNN algorithm is employed to construct the model using Google Form response data as part of the application development process. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20