Search Results - adaptive _ difference ((equations algorithm) OR (encryption algorithm))

Refine Results
  1. 1

    A new cryptosystem analogous to LUCELG and Cramer-Shoup by Muslim, Norliana, Md. Said, Mohamad Rushdan

    Published 2009
    “…Based on LUCELG and Cramer-Shoup cryptosystems, a new public key cryptosystem is developed by generating the key generation, encryption and decryption algorithm. There are two types of security for the new cryptosystem that we are concerned which are the security of Lucas function and its security against an adaptive chosen ciphertext attack. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Development of a cryptography model based on improved filtering, compression and encryption techniques for ECG signal processing by Hameed, Mustafa Emad

    Published 2022
    “…Furthermore, to increase security, a cryptography mechanism has been employed using the Advanced Encryption Standard (AES) algorithm and Cipher Block Chaining (CBC) operation mode scheme with a 256-bit key. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Enhancing user authentication for cloud web-based application / Detar Beqo by Detar , Beqo

    Published 2018
    “…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Adaptive step size of diagonally implicit block backward differentiation formulas for solving first and second order stiff ordinary differential equations with applications by Mohd Ijam, Hazizah

    Published 2020
    “…The methods are implemented in fixed and adaptive step approaches. Comparisons on numerical results to existing BBDF methods demonstrate a comparable performance of both fixed and adaptive step formulas in terms of accuracy. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    One-step block methods for solving ordinary and delay differential equations by Mohd Radzi, Hazwani

    Published 2011
    “…This thesis describes the implementation of one step block methods of Runge-Kutta type for solving first order Ordinary Differential Equations (ODEs) and Delay Differential Equations (DDEs). …”
    Get full text
    Get full text
    Thesis
  9. 9

    Block multistep methods for solving first order retarded and neutral delay differential equations by Abdul Aziz, Nurul Huda

    Published 2015
    “…There are two strategies that have been implemented in the numerical solutions which are the variable step size and the variable step size and variable order. In the developed algorithm, a Newton divided difference interpolation has been used in approximating a non-vanishing delay, whilst a new approach that is based on an adaptation of predictor-corrector scheme has been used to handle the vanishing delay problems. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Application of genetic algorithms to model parameter identification of a recombinant e.coli high-cell density fed-batch fermentation / Kamaruddin Mamat and Farida Zuraina Mohd Yuso... by Mamat, Kamaruddin, Mohd Yusof, Farida Zuraina

    Published 2008
    “…The structure of the kinetic equations was derived from literature and adapted to represent experimental results. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Application of genetic algorithms to model parameter identification of a recombinant e.coli high-cell density fedbatch fermentation / Kamaruddin Mamat and Farida Zuraina Mohd Yusof by Mamat, Kamaruddin, Mohd Yusof, Farida Zuraina

    Published 2008
    “…The structure of the kinetic equations was derived from literature and adapted to represent experimental results. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Characterization of oil palm fruitlets using artificial neural network by Olukayode, Ojo Adedayo

    Published 2014
    “…To further validate the generalization accuracy of the LSB_ANN, its performance was compared with that of a Multi-ANFIS network as well as those of three different ANN training algorithms: Levenberg Marquardt (LM) algorithm, Resilient Backpropagation (RP) algorithm and Gradient Descent with Adaptive learning rate (GDA). …”
    Get full text
    Get full text
    Thesis
  13. 13

    A hybrid technique of deep learning neural networks with finite difference method for higher order fractional Volterra-Fredholm integro-differential equations with φ-Caputo operato... by Alsa’Di, Kawthar, Nik Long, Nik Mohd Asri

    Published 2025
    “…This technique uses the Adaptive Moment Estimation Method (Adam) as an optimization algorithm with feed-forward deep learning to minimize the error function and training the model using five layers with different activation functions. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Variable step size and order strategy for delay differential equations in PIE(CIE)s mode by Abdul Aziz, Nurul Huda, Abdul Majid, Zanariah

    Published 2014
    “…This article deals with the strategy of variable step size and variable order implementation that has been formulated for solving first order of delay differential equations. This strategy is adapted in PIE(CIE)s mode which is generally based on predictor-corrector scheme in multistep block method of order 4 to 9 with s is for convergence test. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Multistep block methods for solving higher order delay differential equations by Hoo, Yann Seong

    Published 2016
    “…This thesis describes the development of numerical algorithms for solving higher order DDEs. One-point and two-point multistep block method based on the Adam-Bashforth- Moulton methods for solving higher ordinary differential equation are adapted to solve the higher order DDEs. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Adaptive linux-based TCP congestion control algorithm for high-speed networks by Alrshah, Mohamed A.

    Published 2017
    “…Consequently, this behavior improves the ability of TCP to adapt to different long-distance network scenarios, which especially improves bandwidth utilization over high-BDP networks. …”
    Get full text
    Get full text
    Thesis
  17. 17

    WURFL detection engine using cosine string similarity algortlhm / Illiasaak Ahmad ... [et al.] by Ahmad, Illiasaak, Anak Buja, Alya@Geogiana, Abdullah Sani, Anis Shobirin

    Published 2013
    “…Our method is based on three stages: 1) define the problem formulation for device heterogeneity; 2) model a mathematical equation for device heterogeneity detection; 3) develop a cloud-based device heterogeneity detection algorithm. …”
    Get full text
    Get full text
    Research Reports
  18. 18

    A Decentralized Multi-Factor User Authentication Scheme For The Internet Of Things System by Chiadighikaobi, Ikenna Rene

    Published 2024
    “…An enhanced PRESENT encryption and an Elliptic-Curve Cryptography algorithm were adapted to achieve a lightweight authentication scheme, a necessity of the resource-constraint devices. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli by Seyed Hamidreza , Aghay Kaboli

    Published 2018
    “…In the developed feature selection approach, multi-objective binary-valued backtracking search algorithm (MOBBSA) is used as an efficient evolutionary search algorithm to search within different combinations of input variables and selects the non-dominated feature subsets, which minimize simultaneously both the estimation error and the number of features. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Harmonic reduction of a single-phase multilevel inverter using genetic algorithm and particle swarm optimization by Ling, Chin Wan

    Published 2016
    “…In overall result shown both algorithm have high accuracy in solving the non-linear equation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis