Search Results - (( users selection based algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The project's expected outcome is a GPS-Based Physical Identity and Access Management System with the selected lightweight geo-encryption algorithm that can be used to support the control access and management operations of UMS security division.…”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Over the years, various picture-based password systems were proposed to exploit the utility of pictures for user authentication. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS. by FAROOQ, HUMERA

    Published 2012
    “…This is difTerent from existing Interactive Genetic Algorithm in which selection and evaluation of solutions is done by the users. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia by Hindia, Mhd Nour

    Published 2015
    “…The selection is based on the user preferences since it uses a self-learning algorithm to determine triggers and handover thresholds dynamically. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  9. 9

    Multi-user beamforming, fairness and device-to-device channel state information sharing in downlink non-orthogonal multiple access systems by Abdulhussein, Mohanad Mohammed

    Published 2021
    “…The first algorithm is based on integrating the maximum product of effective channel gains and the maximum SIR with the PF principle (PF-MPECG-SIR) to select strong users in the first stage and weak users in the second stage. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation by Mat Jani H., Lee S.P.

    Published 2023
    “…A new case is retained in the case base for future retrievals. A framework user is allowed to select from a list of features provided by the framework that he or she is interested in learning, and the system will give an example of application related to the selected features. …”
    Conference paper
  11. 11

    Web-Based Route Optimization System For Logistic Using Agglomerative Clustering And Genetic Algorithm by Tan, Chee Kuan

    Published 2020
    “…This system enables the logistic company to arrange its route to deliver based on the number of trucks selected by the user. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    User recommendation algorithm in social tagging system based on hybrid user trust by Mustapha, Norwati, Wong, Pei Voon, Sulaiman, Md. Nasir

    Published 2013
    “…The hybrid User Trust method is able to find the most trusted users and selected as neighbours to generate recommendations. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Multiple users replica selection in data grids for fair user satisfaction: A hybrid approach by Jaradat, A., Alhussian, H., Patel, A., Fati, S.M.

    Published 2020
    “…Replica selection in data grids aims to select the best replica location based on the quality-of-service parameters preferred by the user. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Mobile user location prediction: genetic algorithm-based approach by Mantoro, Teddy, Muataz, Zubaidah, Ayu, Media Anugerah

    Published 2010
    “…This paper presents a prediction of user location using genetic algorithm and based location history in finding a number of solutions of possible location when applied to recorded context histories, framework is presented and the result are discussed. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16
  17. 17

    Optimized Cover Selection for Audio Steganography Using Multi-Objective Evolutionary Algorithm by Noor Azam, Muhammad Harith, Ridzuan, Farida, Mohd Sayuti, M Norazizi Sham

    Published 2023
    “…Existing embedding techniques depend on cover audio selected by users. Unknowingly, users may make a poor cover audio selection that is not optimised in its capacity or imperceptibility features, which could reduce the effectiveness of any embedding technique. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Hybrid LTE-Vanets Based Optimal Radio Access Selection by Harum, Norharyati, Abu, Nor Azman, Ali, Mohanad Faeq

    Published 2018
    “…The periodically broadcasted network information supports mobile users to make their selection decisions;mobiles consider their own individual preferences,cost and partial QoS information signaled by the network while making their decision.The switches algorithm between VANET and LTE based on the load value of network and quality of service requirements were proposed.The simulation results have shown that the proposed algorithm has better performance compared with LTE and VANETs separately in terms of packet delivery ratio,latency and application-level throughput. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model by Yaacob, Mohd. Shafiek, Jamaluddin, Hishamuddin

    Published 2001
    “…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
    Get full text
    Get full text
    Get full text
    Article