Search Results - (( development methods issues algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Clock Distribution Network Building Algorithm For Multiple Ips In System On A Chip by Tan , Tze Liang

    Published 2017
    “…To solve this issue, an algorithm is proposed to automate the global CDN building process and at the same time obtain a balanced overall CDN not achieved by the conventional method. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan by Rosselan, Muhammad Zakyizzuddin

    Published 2018
    “…Before incorporating the optimization methods, a sizing algorithm for large-scale GCPV systems was developed. …”
    Get full text
    Get full text
    Thesis
  5. 5

    DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS by MEHMOOD SHAH, SYED NASIR

    Published 2012
    “…The issue is not only to develop new algorithms, but also to evaluate them on an experimental computational grid, using synthetic and real workload traces, along with the other existing job scheduling algorithms. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Development of group method of data handling based on genetic algorithm to predict incipient motion in rigid rectangular storm water channel by Ebtehaj, I., Bonakdari, H., Khoshbin, F., Hin, Ch. Joo Bong, Ab Ghanid, A.

    Published 2017
    “…Sediment transport is a prevalent vital process in uvial and coastalenvironments, and \incipient motion" is an issue inseparably bound to this topic. Thisstudy utilizes a novel hybrid method based on Group Method of Data Handling (GMDH)and Genetic Algorithm (GA) to design GMDH structural (GMDH-GA). …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Efficient genetic partitioning-around-medoid algorithm for clustering by Garib, Sarmad Makki Mohammed

    Published 2019
    “…Finally, the fourth set dealt with the developed method for externally evaluating the variant multi class clusters. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Fuzzy clustering method and evaluation based on multi criteria decision making technique by Sameer, Fadhaa Othman

    Published 2018
    “…This proposed algorithm is developed based on heuristic method named modified binary particle swarm optimization (MBPSO) with kernel fuzzy clustering method as a fitness function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Development of cell formation algorithm and model for cellular manufacturing system by Nouri, Hossein

    Published 2011
    “…Therefore, for this proposes good benchmarked algorithm, bacteria foraging algorithm is selected and developed to solve multiobjective cell formation model and traced constraints satisfaction handling to produce feasible optimal solution. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Enhancing Solutions Of Capacity Vehicle Routing Problem Based On An Improvement Ant Colony System Algorithm by Mutar, Modhi Lafta, Mohd Aboobaider, Burhanuddin, Hameed, Asaad Shakir, Yusof, Norzihani

    Published 2019
    “…VRP is one of the major important issues have no perfect solutions yet. Several authors over the last only some decades have recognized many types of research and used several algorithms with various methods to solve it. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Designing and Developing an Intelligent Congkak by Muhammad Safwan, Mohd Shahidan

    Published 2011
    “…and “Can Min-Max algorithm (MM) be speeded up by using NN as a forward-pruning method?”. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Firefly algorithm for optimal sizing of Standalone Photovoltaic System / Nurizzati Abdul Aziz by Abdul Aziz, Nurizzati

    Published 2016
    “…This study presents the development of Firefly Algorithm-based Sizing Algorithm, known as FASA for sizing optimization of SAPV systems. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Firefly algorithm for optimal sizing of stand-alone photovoltaic system / Nur Izzati Abdul Aziz by Abdul Aziz, Nur Izzati

    Published 2016
    “…This study presents the development of firefly algorithm-based sizing algorithm, known as FASA for sizing optimization of SAPV systems. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map by Emmanuel Oluwatobi Asani, Godsfavour Biety-Nwanju, Abidemi Emmanuel Adeniyi, Salil Bharany, Ashraf Osman Ibrahim Elsayed, Anas W. Abulfaraj, Wamda Nagmeldin

    Published 2023
    “…Permutation and substitution approaches of image encryption were deployed to address the issue of images volume and differing sizes. The issue of misplaced pixel positions in the image was also adequately addressed, making it an effective method for image encryption. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Improved algorithms of elliptic curve point multiplication over binary and prime fields using elliptic net by Muslim, Norliana

    Published 2022
    “…For safe curves of 384 and 512 bits, the developed ENPM algorithm over prime field outperformed the BM algorithm in terms of overall multiplications with 57.60% and 59.16% average running time. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Feature fusion using a modified genetic algorithm for face and signature recognition system by Suryanti, Awang

    Published 2015
    “…Most existing systems are dealing with feature fusion of the same domain such as image based of fingerprint and face. Thus, there is no issue of incompatible features to be fused compared to the proposed development. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Improved expectation maximization algorithm for Gaussian mixed model using the kernel method by Mohd Yusoff, Mohd Izhan, Mohamed, Ibrahim, Abu Bakar, Mohd Rizam

    Published 2013
    “…Finally, for illustration, we apply the improved algorithm to real telecommunication data. The modified method will pave the way to introduce a comprehensive method for detecting fraud calls in future work.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Improving resource management with multi-instance broker scheduling algorithm in hierarchical grid computing by Yahaya, Bakri

    Published 2016
    “…The iHLBA scheduling algorithm was tested and it was found that the main issue was the delay occurring on the job submission. …”
    Get full text
    Get full text
    Get full text
    Thesis