Search Results - (( using function a algorithm ) OR ( knowledge implementation modified algorithm ))

Refine Results
  1. 1
  2. 2

    Security analysis of data transmission in an IoT based platform for telemedicine by Olanrewaju, Rashidah Funke, Amuda, Idowu Rahaman, Hassan Abdalla Hashim, Aisha

    Published 2021
    “…This study proposes a modified folded pipeline architecture for resource restriction applications with an AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Knowledge-based system developement for the game congkak / Syah Ali Reza Yaacob by Yaacob, Syah Ali Reza

    Published 2006
    “…The agent will use Minimax and α-β pruning as the search algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The study recommends to use another type of digital signature algorithm to be used in the proposed method. …”
    Get full text
    Get full text
    Student Project
  5. 5

    Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line by Olufemi, Osaji Emmanuel

    Published 2020
    “…This study proposed a modified standalone Machine Learning-based Adaptive Protection Scheme (ML-APS) relay' fault classifier model using novel useful hidden Knowledge Discovery from historical fault events Dataset (KDD) from healthy and faulty lines. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Zero distortion-based steganography for handwritten signature by Iranmanesh, Vahab

    Published 2018
    “…To the best of our knowledge, this is the first time that a human handwritten signature sample is used for steganography application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Manufacturing process planning optimisation in reconfigurable multiple parts flow lines by Ismail, Napsiah, Musharavati, Farayi, Hamouda, Abdel Magid Salem, Ramli, Abdul Rahman

    Published 2008
    “…Two modified genetic algorithms are devised and employed to provide the best approximate process planning solution. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Process Planning Optimization In Reconfigurable Manufacturing Systems by Musharavati, Farayi

    Published 2008
    “…The five (5) AADTs include; a variant of the simulated annealing algorithm that implements heuristic knowledge at critical decision points, two (2) cooperative search schemes based on a “loose hybridization” of the Boltzmann Machine algorithm with (i) simulated annealing, and (ii) genetic algorithm search techniques, and two (2) modified genetic algorithms. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Image Based Congestion Detection Algorithms And Its Real Time Implementation by Khdiar, Ahmed Nidhal

    Published 2015
    “…The methodology includes vehicle detection by using backlight pairing feature algorithm and modified Watershed algorithm. The results returned by the algorithms are transmitted and received wirelessly using the SFFSDR platform, including the use of RF, FPGA, and DSP modules for variable distances. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Investigation On Optical Fibre Configurations For Process Tomography by Ibrahim, Sallehuddin

    Published 2002
    “…Linear back projection (LBP) algorithm is used to reconstruct the image. A modified reconstruction algorithm combining LBP and a priori knowledge is outlined. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions by Abbas, Iraq Tareq

    Published 2018
    “…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Effect Of The Number Of Tapping Bits Of The A5/1 Stream Cipher Towards Hardware Performance by S.Y.A.M. Fauzi, M. Othman, F.M.M. Shuib, K. Seman

    Published 2024
    “…Objective: In this paper, two modified designs proposed by the author are implemented into hardware and the resulting rate of power consumption is compared with that of the conventional design of the A5/1 stream cipher. …”
    Get full text
    Article
  17. 17

    FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources by Al-Qadhi, Abdulrahman K., Athauda, Rukshan, Latip, Rohaya, Hussin, Masnida

    Published 2026
    “…We have evaluated the FaaSBid model and the proposed algorithms and pricing model by comparing with a number of existing models and algorithms using real-world datasets. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Computing the autopilot control algorithm using predictive functional control for unstable model by H. A., Kasdirin, J. A., Rossiter

    Published 2009
    “…This paper discusses the computing development of a control algorithm using Predictive Functional Control (PFC) for model-based that having one or more unstable poles. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Computation of Maass Cusp Forms on Singly Punctured Two-Torus and Triply Punctured Two-Sphere Using Mathematica by Mohamed Siddig, Abubaker Ahmed

    Published 2009
    “…All the computations were implemented in Mathematica and built in a way accessible to any one with an introductory knowledge in Mathematica. …”
    Get full text
    Get full text
    Thesis