Search Results - (( java application customization algorithm ) OR ( chain generation method algorithm ))

Refine Results
  1. 1

    A hybrid addition chain method for faster scalar multiplication by Mohamad Afendee, Mohamed, Mohamad Rushdan, Md Said

    Published 2015
    “…Totally different from others, this new method uses rule representation for prime factors of n, and a new algorithm to generate a complete chain for n. …”
    Get full text
    Get full text
    Article
  2. 2

    A hybrid addition chain method for faster scalar multiplication by Mohamed, Mohamad Afendee, Md. Said, Mohamad Rushdan

    Published 2015
    “…Totally different from others, this new method uses rule representation for prime factors of n, and a new algorithm to generate a complete chain for n. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Solving the integrated inventory supply chain problems using meta-heuristic methods / Seyed Mohsen Mousavi by Seyed Mohsen , Mousavi

    Published 2018
    “…Taguchi was used to optimize the algorithms parameters. While there was no benchmark in the literature, some numerical examples were generated to show the performance of the algorithms for both Euclidean and Square Euclidean distances while some case studies were also considered.…”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Optimized placement, sizing, and selection of distributed generation using the salp swarm algorithm by Mat Yasin, Zuhaila, Mohammad Noor, Siti Zaliha, Hassan, Elia Erwani, M. Shami, Tareq

    Published 2025
    “…The salp swarm algorithm (SSA) was introduced as a method for efficiently selecting the optimal location, size, and type of distributed generation (DG) in a distribution system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Integrated supply chain planning under uncertainty using an improved stochastic approach by Mohammadi Bidhandi, Hadi, Mohd Yusuff, Rosnah

    Published 2011
    “…The surrogate constraints method will be utilized to acceleration of the decomposition algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Autonomous mobile robot: Path planning using backward chaining by I.M., Nawi, M.A.S.A., Rahim

    Published 2008
    “…This project concerns the design and fabrication of the Autonomous Mobile Robot (AMR) prototype, utilizing backward chaining as a mainframe in helping the robot to generate a self-understanding of the area of work and mobilization to a destination desired by the user. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A modified weight optimisation for higher-order neural network in time series prediction by Husaini, Noor Aida

    Published 2020
    “…Hence, motivated by the advantages of those Modified Cuckoo Search (MCS), the improvement of the MCS called Modified Cuckoo Search-Markov chain Monté Carlo (MCS-MCMC) learning algorithm is proposed for weight optimisation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  9. 9

    On iterative low-complexity algorithm for optimal antenna selection and joint transmit power allocation under impact pilot contamination in downlink 5g massive MIMO systems by Mohammed Ahmed, Adeeb Ali

    Published 2020
    “…The proposed Low–complexity iterative algorithm for antenna selection and transmission power helped to choose an accurate number of active RF chains to reduce circuit power consumption, and minimize the reuse of pilot sequences to improve channel estimation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Statistical analysis on enhanced 3D-AES block cipher cryptographic algorithm / Nor Azeala Mohd Yusof by Mohd Yusof, Nor Azeala

    Published 2021
    “…The output data sequences are generated from seven different data categories. Unfortunately, the failed test results for Cipher Block Chaining Mode (CBCM), Strict Key Avalanche (SKA), High Density Key (HDK), and Random Plaintext Random Key (RPRK) data categories indicate that 3D-AES produced non-random output binary sequences. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Second law considerations in fourier heat conduction of a lattice chain in relation to intermolecular potentials by Christopher, G.J.

    Published 2016
    “…For these harmonic potentials, it appears from the simulation results that steady state solutions exist utilizing non-synthetic thermostats that couple not just the two particles at the extreme ends of the lattice chain, but to a control volume of N particles located at either ends of the chain that does not accord with the unique analytical solutions that obtains for single particle thermostatting at the ends of the lattice with a di�erent thermostatting algorithm that utilizes coupling coe�cients. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Deep learning-based colorectal cancer classification using augmented and normalised gut microbiome data / Mwenge Mulenga by Mwenge , Mulenga

    Published 2022
    “…Consequently, the techniques for combining existing normalisation methods, namely feature extension, chaining and stacking were proposed in the research. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    A preliminary framework of measuring music attractiveness based on facial beauty theory by Hoo, Yong Leng, Mohd Norowi, Noris, Jantan, Azrul Hazri

    Published 2016
    “…Since the advent of modern computing, various methods were introduced to help music composition, such as Markov Chain (MC), Genetic Algorithm, Knowledge-Based system, and Cellular Automata. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Fault detection and diagnosis using rule-based support system on fatty acid fractionation column by Yann, H. H., Ali, Mohamad Wijayanuddin, Kamsah, Mohd Zaki

    Published 2003
    “…Identification of causes, consequences and suggested actions for each deviation assisted by Hazard and Operability Study (HAZOP) analysis are generated into rule-based algorithm. Forward chaining strategy is used to interpret the rule-based system. …”
    Get full text
    Get full text
    Article
  16. 16

    Energy-Efficient Low-Complexity Algorithm in 5G Massive MIMO Systems by Salh, Adeeb, Audah, Lukman, Abdullah, Qazwan, M. Shah, Nor Shahida, A. Hamzah, Shipun, Nordin, Shahilah, Farah, Nabil

    Published 2021
    “…This formulates the optimization problem of joint optimal antenna selection, transmits power allocation and joint user selection to mitigate inter-cellinterference in downlink multi-cell massiveMIMO systems under minimized reuse of pilot sequences based on a novel iterative low-complexity algorithm (LCA) for Newton’s methods and Lagrange multipliers. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Energy-efficient power allocation and joint user association in multiuser-downlink massive MIMO system by Salh, Adeeb, Nor Shahida, Mohd Shah, Audah, Lukman, Abdullah, Lukman, Jabbar, Waheb A.

    Published 2019
    “…The computational efficiency to maximize EE power allocation is very important to fifth generation networks (5G). The study aims to maximize the non-convex EE in a downlink (DL) massive MIMO system using a proposed energy-efficient low-complexity algorithm (EELCA) that guarantees optimal power allocation solution based on Newton’s methods and joint user’s association based on the Lagrange’s decomposition method. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Determining malaria risk factors in Abuja, Nigeria using various statistical approaches by Segun, Oguntade Emmanuel

    Published 2018
    “…The Moran I index using distance decay method to generate the weight gave a spatial autocorrelation of -0.33. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Artificial intelligence revolutionising the automotive sector: A comprehensive review of current insights, challenges, and future scope by Hossain, Md Naeem, Rahim, Md. Abdur, Rahman, Md Mustafizur, D., Ramasamy

    Published 2025
    “…This review introduces a novel taxonomic framework that provides a holistic perspective on AI integration into the automotive sector, focusing on next-generation AI methods and their critical implementation aspects. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20