Search Results - (( java implication based algorithm ) OR ( using claim process algorithm ))
Search alternatives:
- implication based »
- process algorithm »
- java implication »
-
1
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
2
Risk analysis of the copula dependent aggregate discounted claims with Weibull inter-arrival time
Published 2021“…We use a copula to represent the dependence structure between the inter-claim arrival time and its subsequent claim amount. …”
Get full text
Get full text
Get full text
Article -
3
-
4
Static and self-scalable filter range selection algorithms for peer-to-peer networks
Published 2011“…The static filter range selection algorithm uses a fixed filter range approach to locate the target key, in which the filter range is preset at the beginning of the searching process. …”
Get full text
Get full text
Thesis -
5
Customised fitness function of evolutionary algorithm for optimization of car park space / Ahmad Syahir Ab. Aziz
Published 2017“…There are six steps of genetic algorithm. The prototype is useful to worker in construction calculate the total number of parking spaces in the future.…”
Get full text
Get full text
Thesis -
6
Fractional Stochastic Gradient Descent Based Learning Algorithm For Multi-layer Perceptron Neural Networks
Published 2021“…In this study, we propose a learning algorithm for the training of MLP models. Conventionally back-propagation learning algorithm also termed as (BP-MLP) is used. …”
Get full text
Get full text
Conference or Workshop Item -
7
Modeling Earthquake Bond Prices with Correlated Dual Trigger Indices and the Approximate Solution Using the Monte Carlo Algorithm
Published 2025journal::journal article -
8
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
9
Encryption selection for WLAN IEEE802.11G
Published 2013“…The impact on throughput and time success can be examined based on encryption algorithms and encryption protocols by using this proposed mechanism. …”
Get full text
Get full text
Thesis -
10
FEATURES EXTRACTION OF FINGERPRINTS BASED ON HYBRID PARTICLE SWARM OPTIMIZATION AND BAT ALGORITHMS
Published 2023“…That means the hybrid (PSO-BA) algorithm has the better results, which means it can be used as one of the best search approaches to extract features from fingerprints � 2022, Authors. …”
Article -
11
Soap performance enhancement for high volume messaging / Ali Baba Dauda
Published 2018“…SOAP is one of the best protocols using XML to exchange message but the XML is too verbose and slows the communication process. …”
Get full text
Get full text
Get full text
Thesis -
12
Effective software fault localization based on complex network theory / Abubakar Zakari
Published 2019“…This has led researchers to adopt approaches such as one bug-at-a-time debugging approach (OBA) and parallel debugging approach. However, using OBA debugging approach increases software time-to-delivery and potentially leads to more faults during regression testing, while utilizing k-mean clustering algorithm with Euclidean distance metric to group failed tests based on their execution profile similarity in parallel debugging approach is claimed to be problematic and inappropriate. …”
Get full text
Get full text
Get full text
Thesis -
13
-
14
An evolutionary based features construction methods for data summarization approach
Published 2015“…In other words, this research will discuss the application of genetic algorithm to optimize the feature construction process from the Coral Reefs data to generate input data for the data summarization method called Dynamic Aggregation of Relational Attributes (DARA). …”
Get full text
Get full text
Research Report -
15
Designing substitution boxes based on chaotic map and globalized firefly algorithm
Published 2019“…The FA is a newly developed metaheuristic algorithm inspired by fireflies and their flash lighting process. …”
Get full text
Get full text
Thesis -
16
A fuzzy adaptive teaching learning-based optimization strategy for generating mixed strength t-way test suites
Published 2019“…The use of meta-heuristic algorithms as the basis for t-way (where t indicates the interaction strength) and mixed strength testing strategies is common in recent literature. …”
Get full text
Get full text
Thesis -
17
-
18
Enhancing the Problem Solving Skills of Decision Science Learners
Published 2015“…Results revealed that the cognitive processes of successful solvers followed a set of algorithms. …”
Get full text
Get full text
Get full text
Journal -
19
Poisson Transmuted Exponential Distribution For Count Data With Skewed, Dispersed And Excess Zero
Published 2024“…Different Moment-Based Mathematical Properties Of The New Proposed Distributions Are Obtained. Different Algorithms Are Used To Assess The Maximum Likelihood Estimates For The Parameters Of The Proposed Distributions.The Newton-Raphson And The Nelder-Mead, With Minimum Iterations For Convergence And Log-Likelihood Values, Provide Optimum Estimates. …”
Get full text
Get full text
Thesis -
20
Steganalysis: Detecting Existence of File Types Embedded in Grey Scale Image
Published 2008“…Estimating some parameters of embedding algorithm is the approach that the study used since secret message is one of its essential parameters. …”
Get full text
Get full text
Get full text
Thesis
