Search Results - (( java implication based algorithm ) OR ( programming practice new algorithm ))

Refine Results
  1. 1

    Practical cryptography: algorithms and implementations using C++

    Published 2014
    “…Some books that include cryptographic algorithms with practical programming codes are by this time (i.e., at the preparation of this book) outdated. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book
  2. 2
  3. 3
  4. 4

    Metaheuristic Algorithms Based on Compromise Programming for the Multi-Objective Urban Shipment Problem by Ngo, T.S., Jaafar, J., Aziz, I.A., Aftab, M.U., Nguyen, H.G., Bui, N.A.

    Published 2022
    “…We evaluated the effectiveness of the proposed algorithm with the Tabu Search algorithm and the original genetic algorithm on the tested dataset. …”
    Get full text
    Get full text
    Article
  5. 5

    Swarm inspired test case generation for online C++ programming assessment by Foong, O.-M., Tran, Q.-T., Yong, S.-P., Rais, H.M.

    Published 2014
    “…It also helps students to practice and enhance their programming skills. In this study, the mechanism of automatic test case generation was explored using Particle Swarm Optimization (PSO) algorithm and new fitness function is proposed to determine the optimal solution for each problem. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Parallel Block Methods for Solving Ordinary Differential Equations by Abdul Majid, Zanariah

    Published 2004
    “…The parallel programs were run on a Sequent Symmetry SE30 parallel computer.The Cq stability in the multistep method was introduced and the focused was on the error propagation from a more practical angle. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Optimizing tree planting areas through integer programming and improved genetic algorithm by Md Badarudin, Ismadi

    Published 2012
    “…Therefore, a hybrid algorithm through an incorporation of Integer Programming and Improved Genetic Algorithm was proposed for planting lining design. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Low-level hybridization scripting language with dynamic parameterization in PSO-GA / Suraya Masrom by Masrom, Suraya

    Published 2015
    “…The codes of the scripting language are shown to easily use, concisely describe the algorithm in a directly publishable form and flexible for new problem creations. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming by Hussien, Hassan Mansur, Md Yasin, Sharifah, Muda, Zaiton, Udzir, Nur Izura

    Published 2019
    “…In relation to this, a new theoretical attack such as related-key differential cryptanalysis (RDC) could give rise to a more practical technique. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    An alternative method to solve combined economic emission dispatch problems using flower pollination algorithm by Hong, Mee Song

    Published 2016
    “…Flower Pollination Algorithm (FPA) is a new biologically inspired meta-heuristic optimization technique based the pollination process of flowers. …”
    Get full text
    Get full text
    Thesis
  11. 11

    CONTINGENCY ANALYSIS OF POWER SYSTEM NETWORKS by ABDUL RAUF, MOHD HAFIZ

    Published 2006
    “…The algorithms have been accommodated in one complete program making it an effective tool for contingency analysis. …”
    Get full text
    Get full text
    Final Year Project
  12. 12
  13. 13

    Robotics in Education by Norashikin, M. Thamrin, Addie, Irawan, Zurita, Zulkifli, Syed Abdul Mutalib, Al Junid, Megat Syahirul Amin, Megat Ali, Anwar P. P., Abdul Majeed

    Published 2026
    “…Spanning six chapters, it examines robotics’ ability to enhance technical and collaborative skills while addressing challenges such as resource accessibility and curriculum integration. Core programming concepts, including control systems, algorithm design, and debugging, are elaborated upon using tools like Python and ROS. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book
  14. 14
  15. 15

    An integrated algorithm of analytical network process with case-based reasoning to support the selection of an ideal football team formation and players by Mohammad Zukuwwan, Zainol Abidin

    Published 2021
    “…This research constructs a self-generated calculation algorithm as a decision engine in a practical, user-friendly Decision Support System to determine the best team formation and the suitable playing position for players in a football team. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Box-jenkins and genetic algorithm hybrid model for electricity forecasting system by Mahpol, Khairil Asmani

    Published 2005
    “…In this thesis, an approach that combines the Box-Jenkins methodology for SARIMA model and Genetic Algorithm (GA) will been introduced as a new approach in making a forecast. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Back propagation neural network approach for churn prediction: a case study in Celcom (M) Berhad / Hapida Husin by Husin, Hapida

    Published 2008
    “…The data has been chunk into a few series to determine the significant variables for predicting churn. Computer program were written in Matlab to implement the training and testing programs for the ANN algorithms. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Computational Biology and Chemistry by Marko Popovic

    Published 2025
    “…The atom counting method requires knowledge of genetic sequence, protein sequences and protein copy numbers. An algorithm was sug- gested for a program that findselemental composition of various viruses (DNA or RNA, enveloped or non- enveloped). …”
    Get full text
    Other
  19. 19

    AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm by Salim, Nur Saadah, Saad, Shahadan

    Published 2025
    “…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Immunized-evolutionary algorithm based technique for loss control in transmission system with multi-load increment by Shaaya S.A., Musirin I., Sulaiman S.I., Mansor M.H.

    Published 2023
    “…Nevertheless, EP is an old technique that sometimes could reach to a settlement that is not fully satisfied. Thus, the need fora new approach to improve the setback is urgent. This paper presents immunized-evolutionary algorithm based technique for loss control in transmission system with multi -load increment. …”
    Article