Search Results - (( users selection method algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Literature review and experiment aimed to select the fastest lightweight geo-encryption algorithms and the smallest ciphertext and key size. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…This research was undertaken to develop methods to mitigate shoulder-surfing attack. Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  5. 5

    Development of a novel component carrier selection algorithm in long term evolution-advanced (LTE-A) with carrier aggregation by Al Katsha, Mhd Zaher, Mohd. Ramli, Huda Adibah

    Published 2017
    “…At the early stage of migration, there will be many LTE users in the LTE-Advanced system. Therefore, CC selection algorithm that is responsible to assign a CC to each newly-arrived legacy LTE users is becoming of paramount importance in the LTE-Advanced system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6

    Optimized Cover Selection for Audio Steganography Using Multi-Objective Evolutionary Algorithm by Noor Azam, Muhammad Harith, Ridzuan, Farida, Mohd Sayuti, M Norazizi Sham

    Published 2023
    “…Existing embedding techniques depend on cover audio selected by users. Unknowingly, users may make a poor cover audio selection that is not optimised in its capacity or imperceptibility features, which could reduce the effectiveness of any embedding technique. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Effective query structuring with ranking using named entity categories for XML retrieval by Roko, Abubakar

    Published 2016
    “…Finally, the system utilizes a query formulation algorithm (QRYF) to select the structured queries that best interpret user query. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    User recommendation algorithm in social tagging system based on hybrid user trust by Mustapha, Norwati, Wong, Pei Voon, Sulaiman, Md. Nasir

    Published 2013
    “…The hybrid User Trust method is able to find the most trusted users and selected as neighbours to generate recommendations. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A hybrid approach for personalized news recommendation with ordered clustering algorithm, rich user and news metadata by Darvishy, Asghar

    Published 2019
    “…We have proposed a clustering algorithm named Ordered Clustering with a specific characteristic that allows multiple membership in clusters which reflects the news nature and user behavior. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Multi-criteria acces selection mechanism based on user preferences in heterogeneous wireless networks by Xiaoxue, Guo

    Published 2023
    “…It easily leads to access selection schemes that are out of line with the actual user requirements, and it does not improve user experience. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    An improved component carrier selection algorithm for downlink long term evolution advanced by Mohd. Ramli, Huda Adibah, Mohd. Isa, Farah Nadia, Asnawi, Ani Liza

    Published 2014
    “…Given that there are multiple CCs available, an efficient CC selection algorithm is necessary in order to assign a CC to each LTE user. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Multiple users replica selection in data grids for fair user satisfaction: A hybrid approach by Jaradat, A., Alhussian, H., Patel, A., Fati, S.M.

    Published 2020
    “…Replica selection in data grids aims to select the best replica location based on the quality-of-service parameters preferred by the user. …”
    Get full text
    Get full text
    Article
  13. 13

    Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model by Yaacob, Mohd. Shafiek, Jamaluddin, Hishamuddin

    Published 2001
    “…The method of selection of the input variables, the number of rules, and the learning rate are briefly discussed. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Utilizing artificial bee colony algorithm as feature selection method in Arabic text classification by Hijazi, Musab, Zeki, Akram M., Ismail, Amelia Ritahani

    Published 2023
    “…One of the widely used algorithms for feature selection in text classification is the Evolutionary algorithm . …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Performance-aware cost-effective brokering and load balancing algorithms for data center in large scale cloud computing by Naha, Ranesh Kumar

    Published 2015
    “…Cloud broke ring is an intermediate negotiator between users and service providers. This negotiator helps users to select appropriate provider as their requests. . …”
    Get full text
    Get full text
    Thesis
  16. 16

    Selection of access network using cost function method in heterogeneous wireless network by Mohamad Tahir, Hatim, Al-Ghushami, Abdullah Hussein, Yahya, Zainor Ridzuan

    Published 2014
    “…Hence, a vertical handover network selection (VHONS) being used to aid in term of service quality for user's satisfaction of the mobile terminal.This article intends to propose a new method of choosing the vertical handover network. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia by Hindia, Mhd Nour

    Published 2015
    “…The selection is based on the user preferences since it uses a self-learning algorithm to determine triggers and handover thresholds dynamically. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Image classification using two dimensional wavelet coefficients with parallel computing by Ong, Yew Fai

    Published 2020
    “…In addition, this research does not require any pre-stored database to train the algorithm. This research requires the supervision from the users to train the algorithm by naming the region. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis