Search Results - candidate ((((encryption algorithm) OR (selection algorithm))) OR (optimisation algorithm))

Refine Results
  1. 1

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Several algorithms, methods and spreadsheets are being proposed by various researchers in this field to improve materials selection. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…The proposed solution comes with low complexity and is used to en- hance the security of the standard LSB algorithm by replacing an originally less secured sequential data hiding with a random pixel selection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Optimal timber transportation planning in tropical hill forest using bees algorithm by Jamaluddin, Jamhuri

    Published 2022
    “…Cells with timbers were assigned as -from node, and the model finds the following cells simultaneously on the extraction technique selection and forest road network. To limit the searching space from timbers to the first exit; landing, a geographically weighted regression (GWR) was used to select the candidate landings. …”
    Get full text
    Get full text
    Thesis
  5. 5

    OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA by DORE RAJA, ANAND A RAJA

    Published 2004
    “…The aim of the competition was to find a suitable candidate to replace DES at the core of many encryption systems worldwide. …”
    Get full text
    Get full text
    Final Year Project
  6. 6

    Hybrid genetic algorithm for uncapacitated university examination timetabling problem by Ishak, Suhada

    Published 2015
    “…The main components of the genetic operators in a Genetic Algorithm (GA) will be tested and the best combination of the genetic operators will be adopted to construct a Pure Genetic Algorithm (PGA). …”
    Get full text
    Get full text
    Thesis
  7. 7

    An e-voting application using cryptography technology by Chin, Hsin Tien

    Published 2020
    “…Hashing function mainly encrypts the user's confidential information to prevent theft by other users and the encrypt method can be implement from Visual Studio which is SHA-256 (Secure Hash Algorithm- 256 bits), a cryptographic hash function designed by US NSA (United States National Security Agency). …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Optimization Of Twofish Encryption Algorithm On FPGA by Raja, Ananda Raja Dore, Zain Ali, Noohul Basheer, Hussin, Fawnizu Azmadi

    Published 2005
    “…The aim of the competition was to find a suitable candidate to replace DES at the core of many encryption systems worldwide. …”
    Get full text
    Conference or Workshop Item
  9. 9

    Hybrid genetic algorithm for university examination timetabling problem by Ishak, Suhada, Lee, Lai Soon, Ibragimov, Gafurjan

    Published 2016
    “…The main components of the genetic operators in a GA will be tested and the best combination of the genetic operators will be adopted to construct a Pure Genetic Algorithm (PGA). The PGA will then hybridised with three new local optimisation techniques, which will make up the HGA; to improve the solutions found. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    AES S-box modification uses affine matrices exploration for increased S-box strength by Alamsyah, Alamsyah, Setiawan, Abas, Trisnawan Putra, Anggyi, Budiman, Kholiq, Muslim, Much Aziz, Salahudin, Shahrul Nizam, Prasetiyo, Budi

    Published 2025
    “…The internet and technological advancements are rapidly growing in this era, potentially giving rise to new challenges, particularly in data security. One algorithm developed to secure data is the Advanced Encryption Standard (AES). …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A competitive co-evolutionary approach for the nurse scheduling problem by Mohamad Nazri, Maizatul Farhana, Mohd Yusoh, Zeratul Izzah, Basiron, Halizah, Daud, Azlina

    Published 2026
    “…The Nurse Scheduling Problem (NSP) is a constrained combinatorial optimisation problem that plays a critical role in healthcare scheduling and constraint optimisation. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Job recruiting system using sorting Algorithm / Adi Asyraf Ayob by Ayob, Adi Asyraf

    Published 2020
    “…The sorting algorithm will assist the recruiters in selecting best job candidate by assigning score to each applicants and sort the applicant list by the finest score value. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Prescription: Issue No. 7 (July 2024) by UiTM, Faculty of Pharmacy

    Published 2024
    “…In pharmaceutical research, ML accelerates the identification of potential drug candidates, improves design optimisation, and increases research efficiency. …”
    Get full text
    Get full text
    Monograph
  16. 16

    Revolutionising pharmacy through machine learning: the progress and perils / Yuslina Zakaria by Zakaria, Yuslina

    Published 2024
    “…In pharmaceutical research, ML accelerates the identification of potential drug candidates, improves design optimisation, and increases research efficiency. …”
    Get full text
    Get full text
    Article
  17. 17

    White Hole-Black Hole Algorithm by Suad Khairi, Mohammed, Zuwairie, Ibrahim, Hamdan, Daniyal, Nor Azlina, Ab. Aziz

    Published 2016
    “…The white hole is selected to be the worst candidate (star), and the black hole will be the best star at each iteration of the WH-BH algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…This paper presents a classification approach on android malware using candidate detectors generated from an unsupervised association rule of Apriori Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Sony applicant recruitment system using fuzzy logic / Nik Zurifa Nabilah Zulkifli by Zulkifli, Nik Zurifa Nabilah

    Published 2022
    “…The purpose of this research is to apply the Fuzzy Logic approach to select candidates in companies. A real criteria position in Sony is used to validate the suggested paradigm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Suitability Factor on the Capacitated Vehicle Routing Problem by Md Rais, Helmi, Ali Othman, Zulaiha, Hamdan, Abdul Razak

    Published 2010
    “…Applying elitist concept, rearrangement of candidate selection and vehicle capacity as part of its decision making can influence its achievement to reach an optimal distance.…”
    Get full text
    Get full text
    Conference or Workshop Item