Search Results - (( java implementation level algorithm ) OR ( network implementation modified algorithm ))

Refine Results
  1. 1

    Improving on the network lifetime of clustered-based wireless sensor network using modified leach algorithm by Zeni, Saltihie

    Published 2012
    “…This document is a study about LEACH algorithm where the implementation was done using OMNeT++ network simulator to study the performance of this algorithm in term of network lifetime. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Study Of Modified Training Algorithm For Optimized Convergence Speed Of Neural Network by Kang, Miew How

    Published 2016
    “…Two modified algorithms are proposed in this research, which are mixture of the momentum algorithm with different learning rate algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Functional link neural network with modified bee-firefly learning algorithm for classification task by Mohmad Hassim, Yana Mazwin

    Published 2016
    “…This work proposed the implementation of modified Artificial Bee Colony with Firefly algorithm for training the FLNN network to overcome the drawback of BP-learning algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    An ensemble of neural network and modified grey wolf optimizer for stock prediction by Das, Debashish

    Published 2019
    “…The research implements stock prediction analysis as a case study for training the neural network by adopting MGWO algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Modified Kohonen network algorithm for selection of the initial centres of Gustafson-Kessel algorithm in credit scoring by Sameer, Fadhaa Othman, Abu Bakar, Mohd Rizam

    Published 2017
    “…To overcome this problem of Gustafson-Kessel (GK) algorithm, we proposed a modified version of Kohonen Network (KN) algorithm to select the initial centres. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Modified artificial neural network (ANN) models for Malaysian construction costs indices (MCCI) data / Saadi Ahmad Kamaruddin by Ahmad Kamaruddin, Saadi

    Published 2018
    “…Artificial neural network (ANN) is one of the most prominent universal approximators, and has been implemented tremendously in forecasting arena. …”
    Get full text
    Get full text
    Book Section
  10. 10

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11
  12. 12

    Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security by H. Belgassem, Seddeq

    Published 2004
    “…The computation results show that the key generation process using the modified algorithm is around three times faster than the old implementation. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Modified firefly algorithm for directional overcurrent relay coordination in power system protection / Muhamad Hatta Hussain by Hussain, Muhamad Hatta

    Published 2020
    “…The objectives of the studies are to develop a new optimization technique termed as Modified Firefly Algorithm (MFA) for minimizing the relay operating time, to develop a Multi-Objective Modified Firefly Algorithm (MOMFA) for minimizing both the total relay operating time and relay coordination time and to develop an integrated optimal predictor termed as Modified Firefly Algorithm-Artificial Neural Network (MFA-ANN) for accurate prediction of relay operating time. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Power system network splitting and load frequency control optimization using ABC based algorithms / Kanendra Naidu a/l Vijyakumar by Vijyakumar, Kanendra Naidu

    Published 2015
    “…Subsequently, the modified optimization is implemented in order to find the optimum system splitting solution which ensures minimal power flow disruption. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    A modified group authentication scheme for machine type communication in LTE/LTE-a networks by Ismail, Haqi Khalid

    Published 2018
    “…In this research, an authentication scheme has been modified to enhance the performance of group authentication in an LTE/LTE-A network. …”
    Get full text
    Get full text
    Thesis
  20. 20