Search Results - (( processes optimization modified algorithm ) OR ( java applications security algorithm ))

Refine Results
  1. 1
  2. 2

    Optimized clustering with modified K-means algorithm by Alibuhtto, Mohamed Cassim

    Published 2021
    “…The proposed algorithm utilised a distance measure to compute the between groups’ separation to accelerate the process of identifying an optimal number of clusters using k-means. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    An ensemble of neural network and modified grey wolf optimizer for stock prediction by Das, Debashish

    Published 2019
    “…Despite its performances, GWO is not without limitation.Precisely, the current best optimal individual of GWO is biased toward alpha and other individuals (e.g. beta and delta) attempt to modify their positions toward this best individual in each iteration process. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Development Of Artificial Bee Colony (Abc) Variants And Memetic Optimization Algorithms by Sulaiman, Noorazliza

    Published 2017
    “…The modified ABC variants have been developed by inserting new processing stages into the standard ABC algorithm and modifying the employed-bees and onlooker-bees phases to balance out the exploration and exploitation capabilities of the algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Modified firefly algorithm for directional overcurrent relay coordination in power system protection / Muhamad Hatta Hussain by Hussain, Muhamad Hatta

    Published 2020
    “…The objectives of the studies are to develop a new optimization technique termed as Modified Firefly Algorithm (MFA) for minimizing the relay operating time, to develop a Multi-Objective Modified Firefly Algorithm (MOMFA) for minimizing both the total relay operating time and relay coordination time and to develop an integrated optimal predictor termed as Modified Firefly Algorithm-Artificial Neural Network (MFA-ANN) for accurate prediction of relay operating time. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Binary whale optimization algorithm with logarithmic decreasing time-varying modified sigmoid transfer function for descriptor selection problem by Yusof, Norfadzlia Mohd, Muda, Azah Kamilah, Pratama, Satrya Fajri, Carbo-Dorca, Ramon, Abraham, Ajith

    Published 2023
    “…This work introduced a new Binary Whale Optimization Algorithm, which utilized a novel time-varying modified Sigmoid transfer function with a modified logarithmic decreasing time-varying update strategy to improve the balancing of exploration and exploitation in WOA. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Modified Harmony Search by Najihah, Mohamed, Ahmad Lutfi, Amri Ramli, Ahmad, Abd Majid, Abd Rahni, Mt Piah

    Published 2017
    “…Propose in this paper Modified Harmony Search for solving optimization problems, which employs a concept from genetic algorithm method and particle swarm optimization for generating new solution vectors that enhances the performance of HS algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    A refined differential evolution algorithm for improving the performance of optimization process by A. R., Yusoff, Nafrizuan, Mat Yahya

    Published 2011
    “…However, the population trapped in local optimality and premature convergence to cause in DE algorithm have cause poor performance during optimization process. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Process Planning Optimization In Reconfigurable Manufacturing Systems by Musharavati, Farayi

    Published 2008
    “…Therefore, this study explores how to model reconfigurable manufacturing activities in an optimization perspective and how to develop and select appropriate non-conventional optimization techniques for reconfigurable process planning.In this study, a new approach to modeling Manufacturing Process Planning Optimization (MPPO) was developed by extending the concept of manufacturing optimization through a decoupled optimization method. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Fuzzy clustering method and evaluation based on multi criteria decision making technique by Sameer, Fadhaa Othman

    Published 2018
    “…The new proposed method (MBPSO+MKN+GK) Gustafson- Kessel algorithm (GK)integrated with modified of Kohonen Network algorithm (MKN)and modified binary particle swarm optimization (MBPSO) was used to classify the credit scoring data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    Capacitated vehicle-routing problem model for scheduled solid waste collection and route optimization using PSO algorithm by Hannan M.A., Akhtar M., Begum R.A., Basri H., Hussain A., Scavino E.

    Published 2023
    “…Costs; Efficiency; Routing algorithms; Scheduling; Solid wastes; Vehicle routing; Capacitated vehicle routing problem; Modified particle swarm optimization; Optimized models; Route optimization; Solid waste collection; Threshold waste level; Travel distance; Waste collection; Particle swarm optimization (PSO); fuel; algorithm; numerical model; optimization; routing; solid waste; transport vehicle; waste disposal; algorithm; Article; capacitated vehicle routing problem model; controlled study; cost; decision making; environmental impact; motor vehicle; nonbiological model; particle swarm optimization algorithm; priority journal; problem solving; process optimization; socioeconomics; solid waste management; travel; validation process; economics; solid waste; waste management; Algorithms; Costs and Cost Analysis; Solid Waste; Waste Management…”
    Article
  19. 19

    Enhancement on the modified artificial bee colony algorithm to optimize the vehicle routing problem with time windows by Sankor, Salah Mortada Shahen

    Published 2022
    “…In this study, existing Modified ABC (MABC) algorithm is revised to solve the VRPTW. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…This project focuses on securing the messages from the intruders. Nowadays, people mostly use mobile application to communicate with each other. …”
    Get full text
    Get full text
    Student Project