Search Results - (( its applications ((new algorithm) OR (_ algorithm)) ) OR ( model application need algorithm ))

Refine Results
  1. 1

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Solar photovoltaic system based on perturb and observe maximum power point tracking with trapezoidal rule approach under partial shading conditions by Altwallbah, Neda Mahmod Mohammad.

    Published 2022
    “…Among all proposed algorithms, perturb and observe (P&O) algorithm is the most popular due to its simplicity and good convergence. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Efficient prime-based method for interactive mining of frequent patterns. by Mohammad Hossein, Nadimi Shahraki, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2011
    “…This is because the appropriate value depends on the type of application and expectation of the user. Moreover, in some real-time applications such as web mining and e-business, finding new correlations between patterns by changing the minimum support threshold is needed. …”
    Get full text
    Get full text
    Article
  6. 6

    Efficient DNS based Load Balancing for Bursty Web Application Traffic by Chin, Mei Lu, Chong, Eng Tan, Mohamad Imran, Bin Bandan

    Published 2012
    “…The proposed algorithm is evaluated via computer simulation and modeling where its performance is verified against the few selected algorithms of the same nature. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Impatient job scheduling under cloud computing by Mahdi, Nawfal A.

    Published 2012
    “…The limitations of those algorithms were addressed and this leads to the proposition of an algorithm that has the ability to map the impatient jobs to virtual machines near its input, output, application, or forth party. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Hybrid moth flame optimization mppt algorithm for accurate real-time tracking under partially shaded photovoltaic system by Tiong, Meng Chung

    Published 2021
    “…However, the high computational power of PSO becomes a disadvantage in real-time and highly dynamic MPPT application. In addition, with the continuous improvement effort and the possibility of a new-comer algorithm can show superior results on the current problem, a new MFO based MPPT algorithm was proposed. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Normalized Relational Storage for Extensible Markup Language (XML) Schema by Kamsuriah, Ahmad, Reduan, Samad

    Published 2011
    “…Problem statement: The use of XML as the common formats for representing, exchanging, storing, integrating and accessing data posses many new challenges to database systems. Most of application data are stored in relational databases due to its popularity and rich development experiences over it. …”
    Get full text
    Get full text
    Journal
  12. 12
  13. 13
  14. 14
  15. 15

    A security payment model for financial payment using mykad by Ahmad Zahari, Nurul Huda

    Published 2011
    “…ARSA will automatically change its security algorithm based on times and attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes by Reem Mustafa , Mah’d Al Debes

    Published 2025
    “…These results validate the algorithm's robustness, particularly under imperfect CSI conditions, where traditional methods often fail. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code by Badawi, Bakri

    Published 2022
    “…The FQR code encoder algorithm provided a novel enhancement to the colour QR code by adding a colour reference to its structure. …”
    Get full text
    Get full text
    Thesis
  20. 20