Search Results - (( java implication based algorithm ) OR ( using claim process algorithm ))

Refine Results
  1. 1

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
    Get full text
    Thesis
  2. 2

    Risk analysis of the copula dependent aggregate discounted claims with Weibull inter-arrival time by Siti Norafidah Mohd Ramli, Sharifah Farah Syed Yusoff Alhabshi, Nur Atikah Mohamed Rozali

    Published 2021
    “…We use a copula to represent the dependence structure between the inter-claim arrival time and its subsequent claim amount. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Static and self-scalable filter range selection algorithms for peer-to-peer networks by Kweh, Yeah Lun

    Published 2011
    “…The static filter range selection algorithm uses a fixed filter range approach to locate the target key, in which the filter range is preset at the beginning of the searching process. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Customised fitness function of evolutionary algorithm for optimization of car park space / Ahmad Syahir Ab. Aziz by Ab. Aziz, Ahmad Syahir

    Published 2017
    “…There are six steps of genetic algorithm. The prototype is useful to worker in construction calculate the total number of parking spaces in the future.…”
    Get full text
    Get full text
    Thesis
  6. 6

    Fractional Stochastic Gradient Descent Based Learning Algorithm For Multi-layer Perceptron Neural Networks by Sadiq, A., Yahya, N.

    Published 2021
    “…In this study, we propose a learning algorithm for the training of MLP models. Conventionally back-propagation learning algorithm also termed as (BP-MLP) is used. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8
  9. 9

    Encryption selection for WLAN IEEE802.11G by Ahmad, Zahrol Azam

    Published 2013
    “…The impact on throughput and time success can be examined based on encryption algorithms and encryption protocols by using this proposed mechanism. …”
    Get full text
    Get full text
    Thesis
  10. 10

    FEATURES EXTRACTION OF FINGERPRINTS BASED ON HYBRID PARTICLE SWARM OPTIMIZATION AND BAT ALGORITHMS by Ahmed A.L., Hassoon N., Hak L.A.L., Edan M., Abed H., Abd S.

    Published 2023
    “…That means the hybrid (PSO-BA) algorithm has the better results, which means it can be used as one of the best search approaches to extract features from fingerprints � 2022, Authors. …”
    Article
  11. 11

    Soap performance enhancement for high volume messaging / Ali Baba Dauda by Ali Baba , Dauda

    Published 2018
    “…SOAP is one of the best protocols using XML to exchange message but the XML is too verbose and slows the communication process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Effective software fault localization based on complex network theory / Abubakar Zakari by Abubakar , Zakari

    Published 2019
    “…This has led researchers to adopt approaches such as one bug-at-a-time debugging approach (OBA) and parallel debugging approach. However, using OBA debugging approach increases software time-to-delivery and potentially leads to more faults during regression testing, while utilizing k-mean clustering algorithm with Euclidean distance metric to group failed tests based on their execution profile similarity in parallel debugging approach is claimed to be problematic and inappropriate. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    An evolutionary based features construction methods for data summarization approach by Rayner Alfred, Suraya Alias, Chin, Kim On

    Published 2015
    “…In other words, this research will discuss the application of genetic algorithm to optimize the feature construction process from the Coral Reefs data to generate input data for the data summarization method called Dynamic Aggregation of Relational Attributes (DARA). …”
    Get full text
    Get full text
    Research Report
  15. 15

    Designing substitution boxes based on chaotic map and globalized firefly algorithm by Ahmed, Hussam Alddin Shihab

    Published 2019
    “…The FA is a newly developed metaheuristic algorithm inspired by fireflies and their flash lighting process. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A fuzzy adaptive teaching learning-based optimization strategy for generating mixed strength t-way test suites by Din, Fakhrud

    Published 2019
    “…The use of meta-heuristic algorithms as the basis for t-way (where t indicates the interaction strength) and mixed strength testing strategies is common in recent literature. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Enhancing the Problem Solving Skills of Decision Science Learners by Cheng, Sheila, Fung, Han Ping

    Published 2015
    “…Results revealed that the cognitive processes of successful solvers followed a set of algorithms. …”
    Get full text
    Get full text
    Get full text
    Journal
  19. 19

    Poisson Transmuted Exponential Distribution For Count Data With Skewed, Dispersed And Excess Zero by Ademola Abiodun, Adetunji

    Published 2024
    “…Different Moment-Based Mathematical Properties Of The New Proposed Distributions Are Obtained. Different Algorithms Are Used To Assess The Maximum Likelihood Estimates For The Parameters Of The Proposed Distributions.The Newton-Raphson And The Nelder-Mead, With Minimum Iterations For Convergence And Log-Likelihood Values, Provide Optimum Estimates. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Steganalysis: Detecting Existence of File Types Embedded in Grey Scale Image by Amirulikhsan, Zolkafli

    Published 2008
    “…Estimating some parameters of embedding algorithm is the approach that the study used since secret message is one of its essential parameters. …”
    Get full text
    Get full text
    Get full text
    Thesis