Search Results - (( java implementation bat algorithm ) OR ( using e using algorithm ))
Search alternatives:
- java implementation »
- implementation bat »
- using algorithm »
- bat algorithm »
- using e »
- e using »
-
1
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Enhance key generation algorithm based user string identity as public key
Published 2015“…However, this algorithm is unable to use all of users’ E-mail addresses as public keys, only certain E-mails can be used as public keys. …”
Get full text
Get full text
Thesis -
3
Algorithm animation for cryptanalysis of caesar and hill ciphers / Sapiee Haji Jamel and Giuseppina Sherry Sayan
Published 2009“…This new trend gives an advantage to cryptanalyst since types of algorithm(s) used are no longer a secret. Cryptanalysis steps can be easily explained using algorithm animation that can be easily integrated with any e-learning platform. …”
Get full text
Get full text
Get full text
Article -
4
A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali
Published 2012“…The algorithms work by arranging parameters using finite field group in elliptic curve E. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Using modification of Prim's algorithm and GNU Octave and to solve the multiperiods installation problem
Published 2020“…Moreover, we compare WWM1 and WWM2 algorithms using existing data from the literature and the results show that WWM2 is the best.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
6
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000Get full text
Get full text
Thesis -
7
-
8
New approach of cryptography algorithm for e- mail applications
Published 2005“…The purpose of this paper is to introduce and demonstrate a new algorithm for Internet and e-mail security. The purposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Experimental implementation controlled SPWM inverter based harmony search algorithm
Published 2023Article -
11
E4ML: Educational Tool for Machine Learning
Published 2003Get full text
Get full text
Conference or Workshop Item -
12
Automated tournament management system with dynamic matchmaking using genetic algorithm / Wan Muhammad Aqil Wan Harun
Published 2016“…CTMS are embedded with dynamic match making using genetic algorithm that can pairs players based on variation combination of criteria such as player’s gender, points and nation. …”
Get full text
Get full text
Thesis -
13
-
14
-
15
-
16
Optimization of drilling path using the bees algorithm
Published 2021Get full text
Get full text
Get full text
Article -
17
Modeling time series data using Genetic Algorithm based on Backpropagation Neural network
Published 2018“…This study showed the task of optimizing the topology structure and the parameter values (e.g., weights) used in the BPNN learning algorithm by using the GA. …”
Get full text
Get full text
Thesis -
18
-
19
An efficient computation technique for cryptosystems based on Lucas functions
Published 2008“…In this paper, we are presenting a new and efficient computations algorithm for LUC Cryptosystems. We have found that the binary sequence used in a new algorithm is shorter than a special sequence used in an existing algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
20
Multi-objective optimisation of assembly line balancing type-e problem with resource constraints
Published 2016“…Later, the optimisation algorithm will be tested and verified using test problems from literature. …”
Get full text
Get full text
Thesis
