Search Results - (( some application among algorithm ) OR ( based application need algorithm ))*

Refine Results
  1. 1
  2. 2

    African Buffalo Optimization Algorithm Based T-Way Test Suite Generation Strategy for Electronic-Payment Transactions by Odili, Julius Beneoluchi, Noraziah, Ahmad, Nasser, Abdullah B., Abd. Wahab, Mohd Helmy, Ahmed, Mashuk

    Published 2021
    “…Experi-mental procedures indicate that the hybridization of the ABO with these algorithmic com-ponents led to faster convergence and greater effectiveness superior to the outcomes of existing techniques, thereby placing the algorithm among the best when compared with other methods/techniques.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    African buffalo optimization algorithm based t-way test suite generation strategy for electronic-payment transactions by B. Odili, Julius, B. Nasser, Abdullah, A., Noraziah, Abd Wahab, Mohd Helmy, Ahmed, Mashuk

    Published 2022
    “…Experimental procedures indicate that the hybridization of the ABO with these algorithmic components led to faster convergence and greater effectiveness superior to the outcomes of existing techniques, thereby placing the algorithm among the best when compared with other methods/techniques.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks by Abdelrahman, Ali Mohamed

    Published 2000
    “…Some of these algorithms do not measure the actual ABR traffic load which leads to either overestimates or underestimates of the bandwidth allocation. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Semantic-Based Scalable Decentralized Resource Discovery by Mahamat Issa , Hassan, Azween, Abdullah

    Published 2010
    “…DA describes resource capabilities, and RA carries resource requests that are needed for some applications. We develop a RD algorithm that optimizes the search of the resources on the network. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Semantic-Based Scalable Decentralized Grid Resource Discovery by Mahamat Issa , Hassan, Azween, Abdullah

    Published 2009
    “…DA describes resource capabilities, and RA carries resource requests that are needed for some applications. We develop a RD algorithm that optimizes the search of the resources on the network. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9
  10. 10
  11. 11

    Seamless horizontal handover algorithm for homogeneous wireless mobile networks using fuzzy logic by Ibrahim, Mohammed Khaleel

    Published 2013
    “…One of the main challenges for robust mobility is the availability of simple and seamless handover algorithms, which allow a mobile node to connect among homogeneous or heterogeneous wireless networks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri by ‘Asri, Nur Nadia Syahirah

    Published 2017
    “…Visual Studio has been used in order to code the program in C#. In addition, some research has been made through observation as well as referring to the published materials and the existing application of fingerprint and Raspberry Pi. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Danger theory metaphor in artificial immune system for system call data by Anjum Iqbal, Anjum Iqbal

    Published 2006
    “…Artificial Immune System (AIS) is a naive paradigm in biologically inspired computation; artificial neural networks (ANNs) and genetic algorithms (GAs) are among popular examples in this domain. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS) by Alsaedi, Noor, Hashim, Fazirulhisyam, Sali, Aduwati, Rokhani, Fakhrul Zaman

    Published 2017
    “…It employs multi-level detection based on identity and position verification. Then, a trust algorithm is applied based on the energy of each sensor node. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Design of photonic band gap aperture coupled fractal shape tri-band active antenna by Saeidi, Tale

    Published 2014
    “…Based on these three different frequencies, an antenna can be developed to resonate at these three frequencies with high performances like high gain and being applicable for the application related to this band (ISM). …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Relationship between tiktok usage and youth well-being involving personality characteristics by Tang, Lian

    Published 2022
    “…By creating a content ecology and recommendation power through algorithms, TikTok enables users with similar interests to expand their social relationships through content sharing, becoming a key trend in social media video applications in China. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20