Search Results - (( parameter information sharing algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    Price discovery in bitcoin spot or futures during the Covid-19 pandemic? evidence from the time-varying parameter vector autoregressive model with stochastic volatility by Mohamad, Azhar, Inani, Sarveshwar Kumar

    Published 2022
    “…This paper examines price discovery between bitcoin spot and futures using static measures, namely information share (IS), component share (CS), modified information share (MIS), information leadership share (ILS), impulse response, and a time-varying parameter vector autoregressive (TVP-VAR) model with stochastic volatility and Markov Chain Monte Carlo (MCMC) sampling algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Meta-scheduler in Grid environment with multiple objectives by using genetic algorithm by Lorpunmanee, Siriluck, Sap, M.N.M, Abdullah, Abdul Hanan, Srinoy, Surat

    Published 2006
    “…Such flexible resource request could offer the opportunity to optimize several parameters, such as coordinated resource sharing among dynamic collections of individuals, institutions, and resources. …”
    Get full text
    Article
  4. 4

    Enhanced Harris's Hawk algorithm for continuous multi-objective optimization problems by Yasear, Shaymah Akram

    Published 2020
    “…The reference point is determined by the decision maker to guide the search process to a particular region in the true Pareto front. However, HHMO algorithm produces a poor approximation to the Pareto front because lack of information sharing in its population update strategy, equal division of convergence parameter and randomly generated initial population. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Fruit-Fly Based Searching Algorithm For Cooperative Swarming Robotic System by Abidin, Zulkifli Zainal

    Published 2013
    “…The fruit flies or Drosophila Melanogaster movement strategy offers some advantages such as strategic 'search-aggregation' cycle, distribution of moving patterns with Levy Random, information sharing in real-time, and reduction of controller parameters during movements. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Cryptographically Generated Addresses (CGAs): A survey and an analysis of performance for use in mobile environment by Qadir, Sana, Siddiqi, Mohammad Umar

    Published 2011
    “…They have the promising potential of being the basis of authentication mechanisms for Mobile IPv6 because they do not require hosts to share information or security infrastructure. A mobile environment however has several resource constraints that must be considered before any mechanism can be deemed feasible. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    An adaptively switching iteration strategy for population based metaheuristics / Nor Azlina Ab. Aziz by Nor Azlina, Ab. Aziz

    Published 2017
    “…In asynchronous update, the procedures are executed as individual tasks and information is shared and used to guide the search for the optimal solution. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Seamless vertical handover technique for vehicular ad-hoc networks using artificial bee colony-particle swarm optimisation by Abdulwahhab, Mohanad Mazin

    Published 2019
    “…The final operation involves the mobile node sharing the current information with its neighbours’ nodes based on its current location. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Efficient multi-UAV coordination via rl: joint path planning and task scheduling for post-disaster UAV-assisted MEC systems by Adnan, Mohd Hirzi, Ahmad Zukarnain, Zuriati, Subramaniam, Shamala K.

    Published 2025
    “…Meanwhile, task scheduling is optimized using a greedy algorithm to reduce computational complexity, and UAVs cooperate through information sharing to achieve robust performance. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    HABC: Hybrid artificial bee colony for generating variable T-way test sets by Alazzawi, A.K., Rais, H.M., Basri, S.

    Published 2020
    “…PSO was integrated as the exploitation agent for the ABC hence the hybrid nature. The information sharing ability of PSO via the Weight Factor is used to enhance the performance of ABC. …”
    Get full text
    Get full text
    Article
  16. 16

    HABC: Hybrid artificial bee colony for generating variable T-way test sets by Alazzawi, A.K., Rais, H.M., Basri, S.

    Published 2020
    “…PSO was integrated as the exploitation agent for the ABC hence the hybrid nature. The information sharing ability of PSO via the Weight Factor is used to enhance the performance of ABC. …”
    Get full text
    Get full text
    Article
  17. 17

    Relay suitability based routing protocol for video streaming in vehicular ad-hoc network by Omar Abdulmaged, Hammood

    Published 2022
    “…It is evident from the result that the proposed algorithm able to produced better result.…”
    Get full text
    Get full text
    Thesis
  18. 18

    Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application by Aminordin, Azmi

    Published 2021
    “…This study suggests the work to combine the optimization of feature selection and algorithm parameters to achieve higher accuracy and acquire more reliable comparison.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    A hybrid cryptosystem for biometric authentication and template protection by Jegede, Abayomi Joshua

    Published 2017
    “…Existing hybrid cryptosystems rely on the secrecy of user-specific parameter and the complexity of template protection algorithms, but do not guarantee template security, user privacy and identity protection once the constituent template protection schemes are compromised. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Improving multi-resident activity recognition in smart home using multi label classification with adaptive profiling by Mohamed, Raihani

    Published 2018
    “…Therefore, Adaptive Profiling (AP) for multi-resident involving context information includes temporal and spatial information is proposed to address the class-overlapping using Expectation-Maximization (EM) clustering. …”
    Get full text
    Get full text
    Thesis