Search Results - (( java implication based algorithm ) OR ( programming services effectiveness algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari by Nazari, Khairul Nashran

    Published 2017
    “…This technique is then compared to DES, 3DES and Blowfish to verify and measure the effectiveness of the AES. The results from this research have proved that the AES is very effective in terms of time taken to encrypt and decrypt documents, strength of the algorithm and the reliability of the program. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Formulating and solving stochastic truck and trailer routing problems using meta-heuristic algorithms / Seyedmehdi Mirmohammadsadeghi by Seyedmehdi, Mirmohammadsadeghi

    Published 2015
    “…For solving TTRP, a variety of algorithms have been applied earlier but TTRPSD programming has not yet solved. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. The algorithm was written in Python programming language to be implementing on a POX controller. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Factors predicting health practitioners' awareness of UNHS program in Malaysian non-public hospitals by Ismail, Abdussalaam Iyanda, Abdul Majid, Abdul Halim, Zakaria, Mohd Normani, Abdullah, Nor Azimah Chew, Hamzah, Sulaiman, Mukari, Siti Zamratol-Mai Sarah

    Published 2018
    “…Health practitioners' awareness is explained by program layout, human resource, and screening instrument with effect size (f2) of 0.065, 0.621, and 0.211 respectively, indicating that program layout, human resource, and screening instrument have small, large and medium effect size on health practitioners' awareness respectively. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    A Novel Integrating Between Tool Path Optimization Using An ACO Algorithm And Interpreter For Open Architecture CNC System by Yusof, Yusri, Latif, Kamran, Hatem, Noor, A. Kadir, Aini Zuhra, Mohammed, M.A

    Published 2021
    “…This article proposes an effective methodology to reduce manufacturing time through the creation of quasioptimal G command sequences, based on initial machining codes derived from CAD/CAM Service-Oriented Architecture (SOA) software. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Security analysis of data transmission in an IoT based platform for telemedicine by Olanrewaju, Rashidah Funke, Amuda, Idowu Rahaman, Hassan Abdalla Hashim, Aisha

    Published 2021
    “…The Internet of Things offers an effective and increased job satisfaction when used for better services on the Internet. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems by Uvaraja, Vikneswary

    Published 2018
    “…A mixed integer programming models are formulated to represent the objectives. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A headway and order scheme based mixed integer goal programming model for railway rescheduling / Zuraida Alwadood by Alwadood, Zuraida

    Published 2017
    “…Service disruptions in rail transport services often lead to trains cancelations and delays. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Off-the-shelf indoor localization system using radio frequency for wireless local area network by Alhammadi, Abdulraqeb Shaif Ahmed

    Published 2018
    “…The location fingerprinting algorithm consists of two phases: offline phase and online phase. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…Distributed Denial of Services (DDoS) has become the most intrusive security threat on the Internet. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Long-term rain attenuation probability and site diversity gain prediction formulas by Al-Tabatabaie, Kusay Faisal A.

    Published 2007
    “…It includes the designing of algorithm flow which incorporated into MATLAB programming software. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    A Confined Workforce Planning Model with Plugging for Service Organizations Using Network Flow Under Finite Horizon, Varying Demand Senario by Varughese, T. C.

    Published 2015
    “…The aim of this study is to develop a user-friendly quantitative model to determine the magnitude of changes in workforce strength of a service industry to meet the varying demands, while maintaining a desired level of quality and cost effectiveness. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis