Search Results - (( development process interception algorithm ) OR ( java adaptation optimization algorithm ))

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar by Jaafar, Mohd Izhar

    Published 2012
    “…It have increase complexity of process encryption and decryption. New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    An efficient likelihood-based modulation classification algorithm for multiple-input multiple-output systems by Bahloul, M.R., Yusoff, M.Z., Abdel-Aty, A.-H., Saad, M.N.M.

    Published 2016
    “…To overcome the problems associated with the existing likelihood-based MC algorithms, a new algorithm is developed in this paper. …”
    Get full text
    Get full text
    Article
  4. 4

    Development of algorithm for single axis sun tracking system by Yi, L.Z., Singh, B.S.M., Ching, D.L.C., Jin, C.L.E.

    Published 2016
    “…The proposed algorithm displays real-time processed data that would enable users to understand the trend of the SEGS output for maintenance prediction and optimization purposes. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A classifier mechanism for host based intrusion detection and prevention system in cloud computing environment by Al-Zarqawee, Aws Naser

    Published 2018
    “…The mechanism’s design is based on the hybrid Antlion Optimization Algorithm (ALO) with Multilayer Perceptron (MLP) to protect against DDoS attacks. …”
    Get full text
    Get full text
    Thesis