Search Results - (( developing squares scheduling algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…A key schedule algorithm is the mechanism that generates and schedules all session-keys for the encryption process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Using Electromagnetism-like algorithm and genetic algorithm to optimize time of task scheduling for dual manipulators by Abed I.A., Sahari K.S.M., Koh S.P., Tiong S.K., Jagadeesh P.

    Published 2023
    “…A method based on Electromagnetism-Like algorithm (EM) and Genetic Algorithm (GA) is proposed to determine the time-optimal task scheduling for dual robot manipulators. …”
    Conference paper
  3. 3

    Optimization of the Time of Task Scheduling for Dual Manipulators using a Modified Electromagnetism-Like Algorithm and Genetic Algorithm by Abed I.A., Koh S.P., Sahari K.S.M., Jagadeesh P., Tiong S.K.

    Published 2023
    “…A method based on a modified electromagnetism-like with two-direction local search algorithm (MEMTDLS) and genetic algorithm (GA) is proposed to determine the optimal time of task scheduling for dual-robot manipulators. …”
    Article
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Optimal short term load forecasting using LSSVM and improved BFOA considering Malaysia pandemic disrupted situation by Zaini, Farah Anishah

    Published 2024
    “…Due to that reason, in this study, the hybrid forecasting model based on the Least Square Support Vector Machine (LSSVM) and Improved Bacterial Foraging Optimization Algorithm (IBFOA) is developed to perform an accurate STLF and applied to load in Peninsular Malaysia during the pandemic disrupted situation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata by Hamdi, Ayman Majid

    Published 2019
    “…However, the fixed key expansion is vulnerable to square attack. On the other hand, the round key expansion algorithms are relatively simple. …”
    Get full text
    Get full text
    Thesis