Search Results - (( developing usage modified algorithm ) OR ( java application among algorithm ))

Refine Results
  1. 1
  2. 2

    Development of transmission usage allocation scheme for deregulated power systems by Mustafa, Mohd. Wazir, Mohd. Khalid, Saifulnizam

    Published 2008
    “…Finally, a new and an improved transmission usage allocation method have been developed for future of the Malaysian electric energy sector.…”
    Get full text
    Monograph
  3. 3
  4. 4

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
    Get full text
    Get full text
    Final Year Project
  5. 5
  6. 6

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…The issue of providing end-toend data protection should has been given highest priority by IoT application developer because the data in both private and public networks can be modified and disrupted by attacker. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Bio-inspired computation: Recent development on the modifications of the cuckoo search algorithm by Haruna, Chiroma, Herawan, Tutut, Iztok, Fister Jr, Iztok, Fister, Abdulkareem, Sameem, Shuib, Liyana, Mukhtar, Fatihu Hamza, Younes, Saadi, Abubakar, Adamu

    Published 2017
    “…Presently, the Cuckoo Search algorithm is attracting unprecedented attention from the research community and applications of the algorithm are expected to increase in number rapidly in the future. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis by Arif Mandangan, Muhammad Asyraf Asbullah, Syed Farid Syed Adnan, Mohammad Andri Budiman

    Published 2024
    “…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis by Mandangan, Arif, Asbullah, Muhammad Asyraf, Adnan, Syed Farid Syed, Budiman, Mohammad Andri

    Published 2024
    “…As a result, several researchers have developed various RSA-based cryptosystems to enhance the algorithm's performance while maintaining security. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection by Nwogbaga, Nweso Emmanuel, Latip, Rohaya, Affendey, Lilly Suriani, Abdul Rahiman, Amir Rizaan

    Published 2022
    “…The simulation is implemented with iFogSim and java programming language. The proposed method can be applied in smart cities, monitoring, health delivery, augmented reality, and gaming among others.…”
    Get full text
    Get full text
    Article
  13. 13

    Energy Management System For Controlling Series Hybrid Electric Motorcycle by Cham , Chin Long

    Published 2016
    “…Tuning and adaptation of the control algorithm had been demonstrated so developers can make use of them for their applications. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    A modified group authentication scheme for machine type communication in LTE/LTE-a networks by Ismail, Haqi Khalid

    Published 2018
    “…The proposed method adopts two efficient algorithms, namely, the Encapsulated Double and Add algorithms which depend on the Tate Pairing form by the bilinear pairing cryptography. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Statistically controlled robust trust computing mechanism for cloud computing by Firdhous, Mohamed, Ghazali, Osman, Hassan, Suhaidi

    Published 2014
    “…Trust computing mechanisms can play an important role in identifying the right service providers who would meet the commitments specified in the Service Level Agreements.Literature has reported several trust computing mechanisms for different distributed systems based on various algorithms and functions.Almost all of them modify the trust scores monotonously even for momentary performance deviations that are reported.This paper proposes a trust computing mechanism that statistically validates the attribute monitored before modifying the trust scores using a hysteresis based algorithm.Hence the proposed mechanism can protect the trust scores from changes due to momentary fluctuations in system performances.The experiments conducted show that the trust scores computed using the proposed mechanism are more representative of the long-term system performance than the ones that were computed without the validation of the inputs.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Quality of service and scheduling performance optimization in LTE networks / Abubakar Auwal Idris by Abubakar Auwal , Idris

    Published 2017
    “…The performance of the developed VRTSA is evaluated and compared with three well-known downlink scheduling algorithms in LTE such as Proportional Fair (PF), Modified Largest Weight Delay First (MLWDF), Exponential Proportional Fair (EXP/PF) as well as recent algorithm called LTTI. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Jawi recognition system by Nur Aziela, Mansor

    Published 2010
    “…The aim of this research is to develop software that able to recognize Jawi character. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19

    Solar Photovoltaic Maximum Power Point Tracking via Predictive Technique by ‘Ainaa Nur Batrisyia binti Abdul Rahman, -

    Published 2022
    “…Apart from that, DC-DC boost converter would be the intermediate in developing the algorithm to the system. The extraction of the maximum output power can be achieved through this mechanism. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  20. 20

    Predicting motorcycle customization preferences using machine learning by Saputra, Ananta, Utoro, Rio Korio, Roedavan, Rickman, Soegiarto, Duddy, Moorthy, Kohbalan, Pratondo, Agus

    Published 2025
    “…The classification model was developed using the Random Forest algorithm, Support Vector Machine and Logistic Regression with 5-fold Cross validation. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item