Search Results - (( java implication force algorithm ) OR ( _ modification process algorithm ))

Refine Results
  1. 1

    Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection by Almazini, Hussein

    Published 2022
    “…The third modification improves the controlled parameter of the MBGWO algorithm using indicators from the search process to refine the solution. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Modification of dijkstra's algorithm for safest and shortest path during emergency evacuation by Khyrina Airin Fariza, Abu Samah, Burairah, Hussin, Abd Samad, Hasan Basari

    Published 2015
    “…The example is presented to compare the result obtained using the modified algorithm. Thus, it reveals the effectiveness of the modification in determining the best path for the evacuation process.…”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    New selection algorithm for Mengubah Destini Anak Bangsa (MDAB) students / Zamali Tarmudi ... [et al.] by Tarmudi, Zamali, Saibin, Tammie Christy, Naharu, Nasrah, Ung, Ling Ling

    Published 2014
    “…It focuses on the refinement and modification of certain variables in selection process. …”
    Get full text
    Get full text
    Research Reports
  4. 4

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…There are four experiment conducted such as processing time, power usage, memory usage and data modification attack. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Optimization of Turning Parameters to Minimize Production Cost using Genetic Algorithm by M. F. F., Ab Rashid, Shah, Izwandi

    Published 2009
    “…This paper presents the study to minimize production cost for CNC turning process by using genetic algorithm (GA) method with some modification. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    An improvement on the valiantbrebner hypercube data broadcasting technique / Nasaruddin Zenon by Zenon, Nasaruddin

    Published 1990
    “…In Section 3.0 we will propose a modification to the V-B algorithm. An analysis of the improved algorithm in comparison to te V-B algorithm is provided at the end of section 3.0.…”
    Get full text
    Get full text
    Article
  8. 8

    Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources by Al‐Sharafi, Ali Mohammed Ali

    Published 2008
    “…First we propose two algorithms to improve the handoff process in AMTree protocol. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A hybrid residue based sequential encoding mechanism with XGBoost improved ensemble model for identifying 5-hydroxymethylcytosine modifications by Uddin I., Awan H.H., Khalid M., Khan S., Akbar S., Sarker M.R., Abdolrasol M.G.M., Alghamdi T.A.H.

    Published 2025
    “…s operations and character. The modification process by the TET enzyme oxidation is the crucial change associated with cytosine hydroxymethylation. …”
    Article
  10. 10

    A HOS-based blind deconvolution algorithm for the improvement of time resolution of mixed phase low SNR seismic data by A.F.M., Hani, M.S., Younis, M.F.M., Halim

    Published 2009
    “…A blind deconvolution technique using a modified higher order statistics (HOS)-based eigenvector algorithm (EVA) is presented in this paper. The main purpose of the technique is to enable the processing of low SNR short length seismograms. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  11. 11

    Image authentication using Zernike moment watermarking by Shojanazeri, Hamid

    Published 2013
    “…The results from the test show that the proposed algorithm has good performance in discriminating the malicious from non-malicious modifications which is the main character of an image authentication algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A hybrid metaheuristic algorithm for identification of continuous-time Hammerstein systems by Jui, Julakha Jahan, Mohd Ashraf, Ahmad

    Published 2021
    “…The second modification was the hybridization of Multi-Verse Optimizer with Sine Cosine Algorithm that will balance the exploration and exploitation processes and thus improve the poor searching capability. …”
    Get full text
    Get full text
    Article
  13. 13

    Modifications of parameter regula falsi method p-RF for inclusion of zero of a function with one real variable by Abu Bakar, Norhaliza

    Published 2012
    “…This study also considers the average of central processing unit (CPU) time of the algorithms of the modified methods where they were ran on Matlab R2007a software in associated with Intlab package. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms by Koh, Johnny Siaw Paw

    Published 2008
    “…The knowledge acquired by the process is interpreted and mapped into vectors, which are kept in the database and used by the system to guide its reasoning process. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development of optimization Alghorithm for uncertain non-linear dynamical system by Abdul Aziz, Mohd. Ismail, Yaacob, Nazeeruddin, Mohd. Said, Norfarizan, Hamzah, Nor Hazadura

    Published 2004
    “…This study succeeded in overcoming the problem of slow convergence and with the modifications, the new algorithms become more efficient in solving the optimal control problems.…”
    Get full text
    Get full text
    Monograph
  16. 16
  17. 17

    Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa... by Noor Hamid, Ahmad Asif Bakhtiar Noor, Nor Zailan, Nor Syazwani, Ishak, Syaza Farlisa

    Published 2019
    “…This is to ensure that the message that had been send can be decrypt successfully. The algorithm that will be used in this paper to complete the cnetyption and decryption process is EIGainal algorithm. …”
    Get full text
    Get full text
    Student Project
  18. 18

    XMCCTree: an algorithm for producing Mcctree in incompact structure by Sazaly, Ummu Sulaim, Selamat, Mohd Hasan, Baharom, Salmi, A. Jabar, Marzanah

    Published 2011
    “…The propose algorithm, namely XMCCTree, employs MCLCA notion with some modifications in order to provide more efficient algorithm.…”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Convergence of interval symmetric single-step method for simultaneous inclusion of real polynomial zeros by Salim, Nur Raidah

    Published 2012
    “…This thesis will cover the algorithms, theoretical analysis and numerical results for each modification. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Collaboration algorithms between intermediaries for supporting flexible supply chain management by Mohd Tamrin, Mohd Izzuddin, Tengku Sembok, Tengku Mohd, Kartiwi, Mira

    Published 2013
    “…Integration challenges remain as main issue for the group to create more flexible processes and allow modification to be made to the current and global pre-planned processes for the entire supply chain members in the group. …”
    Get full text
    Get full text
    Get full text
    Article