Search Results - (( based evaluation _ algorithm ) OR ( based information ((needs algorithm) OR (new algorithm)) ))

Refine Results
  1. 1
  2. 2

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH by LUONG, TRUNG TUAN

    Published 2005
    “…New tools based both on clever applications of established algorithms and on new methodologies, empower us to do entirely new things. …”
    Get full text
    Get full text
    Final Year Project
  4. 4
  5. 5

    Dynamic Probability Selection for Flower Pollination Algorithm based on Metropolis-hastings Criteria by Zamli, Kamal Zuhairi, Din, Fakhrud, Nasser, Abdullah, Ramli, Nazirah, Mohamed, Noraini

    Published 2021
    “…This paper proposed flower pollination algorithm metropolis-hastings (FPA-MH) based on the adoption of Metropolis-Hastings criteria adopted from the Simulated Annealing (SA) algorithm to enable dynamic selection of the pa probability. …”
    Get full text
    Get full text
    Article
  6. 6

    Dynamic probability selection for flower pollination algorithm based on metropolis-hastings criteria by Zamli, Kamal Zuhairi, Din, Fakhrud, Nasser, Abdullah, Ramli, Nazirah, Mohamed, Noraini

    Published 2021
    “…This paper proposed flower pollination algorithm metropolis-hastings (FPA-MH) based on the adoption of Metropolis-Hastings criteria adopted from the Simulated Annealing (SA) algorithm to enable dynamic selection of the pa probability. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources by Al-Qadhi, Abdulrahman K., Athauda, Rukshan, Latip, Rohaya, Hussin, Masnida

    Published 2026
    “…To initialise function placement, Fitness-Based Swap (FBSW) algorithm is proposed which places functions based on pre-defined information such as function size, function maximum execution time, and storage cost. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Sketch-based 3D modeling of symmetric objects from wireframe sketches on paper by Yahya, Zahrah

    Published 2016
    “…The results of the validation show a complete similarity between each original face and the output from our algorithm. Furthermore, the algorithm is also evaluated by human experts and shows 100% correctness.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Efficient DNS based Load Balancing for Bursty Web Application Traffic by Chin, Mei Lu, Chong, Eng Tan, Mohamad Imran, Bin Bandan

    Published 2012
    “…The proposed algorithm is evaluated via computer simulation and modeling where its performance is verified against the few selected algorithms of the same nature. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…Accordingly, a Novel Density-Aware Routing algorithm (NDAR) is proposed. The proposed algorithm totally eliminates the need for fixed threshold values through the use of a novel formula that can easily estimate the node density and replace the fixed threshold value based on the neighbor information. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    An efficient innovative method to decrease routing table size in packet switched networks by Baygi, Maassoumeh Javadi, Ramli, Abdul Rahman, Zaeri, Bahram, Mohd Ali, Borhanuddin

    Published 2013
    “…Appropriate routing for supporting the requirements of various high quality applications emerged in current communication networks is a challenging problem that can lead to improved routing algorithms. Taking into consideration the highly distributed character of networks, numerous multi-agent based algorithms, and particularly ant colony based algorithms, have been proposed in recent years. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…In this study, a new defence mechanism is proposed based on modification of the packet forwarding process, using Neighborhood Information (NI) and PT algorithm, and known as NIPT algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    An adaptively switching iteration strategy for population based metaheuristics / Nor Azlina Ab. Aziz by Nor Azlina, Ab. Aziz

    Published 2017
    “…Experiments conducted using three parent algorithms namely particle swarm optimization (PSO), which is a popular population-based optimizer with population and individual memories, gravitational search algorithm (GSA), a memoryless young optimizer, and simulated Kalman filter (SKF), a newly introduced optimization algorithm that use population’s memory to guide an agent’s search, show that iteration strategy is an algorithm dependent parameter as well as function dependent. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Self organizing multi-objective optimization problem by Ismail, Fatimah Sham, Yusof, Rubiyah, Khalid, Marzuki

    Published 2011
    “…The SOGA involves GA within GA evaluation process which optimally tunes the weight of each objective function and applies weighted-sum approach for fitness evaluation process. …”
    Get full text
    Get full text
    Article
  15. 15

    Analysis and comparison of classification algorithms for credit approval in Islamic banks by Pebrianti, Dwi, Wijanarko, Whena, Bayuaji, Luhur, Toha, Siti Fauziah

    Published 2025
    “…Although Islamic banks do not charge interest, profits are obtained through contracts, requiring thorough and accurate credit analysis. This study evaluates the performance of various classification algorithms, including C4.5, Random Forest, Decision Tree, K-Nearest Neighbors, and Naïve Bayes, in predicting credit approval decisions based on factors such as character, capacity, capital, collateral, and economic conditions. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian by Talebian, Seyed Hamid

    Published 2013
    “…As a comparative study, the performance of the algorithms was evaluated based on various standard metrics. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Modified algorithm for image watermarking using 2D-DCT and elgamal cryptosystem / Nur Azien Yazid, Kamilah Abdullah and Suhaila Abd Halim by Yazid, Nur Azien, Abdullah, Kamilah, Abd Halim, Suhaila

    Published 2019
    “…Value of Peak Signal to Noise Ratio was taken as performance evaluation parameters. On the whole, the performance evaluation shows that combining the two algorithms improved the performance of image watermarking.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Investigation Of Edge Detection Techniques Based On Brain Tumor Images by Rosnan, Murni Nur Athirah

    Published 2018
    “…Based on the quantitative analysis, the new Canny algorithm successfully produced high quality image with less error. …”
    Get full text
    Get full text
    Monograph
  19. 19

    An ensemble data summarization approach based on feature transformation to learning relational data by Chung, Seng Kheau

    Published 2015
    “…The Information Gain borrowed from Information Retrieval theory and Term-term Correlation algorithm are used to determine the relevancy of these features to be selected or merged in order to form a new generation of TF-IDF vector space. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20