Search Results - some contributing ((((function algorithm) OR (encryption algorithm))) OR (selection algorithm))

Refine Results
  1. 1

    Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure by Asbullah, Muhammad Asyraf

    Published 2015
    “…Moreover, for the purpose of empirical evidences, some parameters are chosen in the course of the process to validate the efficiency in terms of algorithmic running time and memory consumptions. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Enhancing performance of XTS cryptography mode of operation using parallel design by Ahmed Alomari, Mohammad

    Published 2009
    “…Performance evaluation shows that XTS exhibits faster speed when an RC6 encryption algorithm is used, compared to other encryption algorithms such as AES and Twofish. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Investigation of data encryption algorithm for secured transmission of electrocardiograph (ECG) signal by Shaikh, Muhammad Umair, Ahmad, Siti Anom, Wan Adnan, Wan Azizun

    Published 2018
    “…This study demonstrates contributions by applying these ideas to two classical problems on the natural algorithm calculation and signal processing.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    An Improved Evolutionary Algorithm in Formulating a Diet for Grouper by Cai-Juan, Soong, Abd Rahman, Rosshairy, Ramli, Razamin

    Published 2023
    “…Subsequently, the novel selection operator embeds the concept of standard deviation in the SR-SD-EA as part of the function in minimizing the total cost of the formulated grouper fish feed. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Chaotic encryption scheme for colour Image using 3D lorenz chaotic map and 3D chen system by Irene Lim Jin Ying, Arif Mandangan

    Published 2024
    “…Chaos-based image encryption system is an encryption method that uses chaotic systems in encrypting digital images for the purpose of enhancing security. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm by Salim, Nur Saadah, Saad, Shahadan

    Published 2025
    “…Extensive testing, including unit, integration, and acceptance testing, has validated the system's functionality, although limitations such as a focus on XSS testing tools and some accuracy concerns were identified. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Forecasting and Trading of the Stable Cryptocurrencies With Machine Learning and Deep Learning Algorithms for Market Conditions by Shamshad, H., Ullah, F., Ullah, A., Kebande, V.R., Ullah, S., Al-Dhaqm, A.

    Published 2023
    “…Moreover, the research experiments are repeated several times to achieve the best results by employing hyperparameter tuning of each algorithm. This involves selecting an appropriate kernel and suitable data normalization technique for SVR, determining ARIMA's (p, d, q) values, and optimizing the loss function values, number of neurons, hidden layers, and epochs in LSTM models. …”
    Get full text
    Get full text
    Article
  8. 8

    Review of Nature Inspired Metaheuristic Algorithm Selection for Combinatorial t-way Testing by Muazu, A.A., Hashim, A.S., Sarlan, A.

    Published 2022
    “…Nature-inspired metaheuristic algorithms contributes significantly to tackling many standing complex problems (such as combinatorial t-way testing problem) and achieving optimal results. …”
    Get full text
    Get full text
    Article
  9. 9

    Modeling of Functional Electrical Stimulation (FES): Powered Knee Orthosis (PKO) assisted gait exercise in post-stroke rehabilitation / Adi Izhar Che Ani by Che Ani, Adi Izhar

    Published 2023
    “…Hemiplegics can recover or at least regain some function. However, if the patient is not appropriately treated, the consequences of the chronic stage will be long-lasting. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Behavioural features for mushroom classification by Ismail, Shuhaida, Zainal, Amy Rosshaida, Mustapha, Aida

    Published 2018
    “…The Principal Component Analysis (PCA) algorithm is used for selecting the best features for the classification experiment using Decision Tree (DT) algorithm. …”
    Get full text
    Get full text
    Article
  11. 11

    Enhanced feature selections of Adaboost training for face detection using genetic algorithm (GABoost) by Mohd. Zin, Zalhan, Khalid, Marzuki, Yusof, Rubiyah

    Published 2007
    “…Often some of these features are irrelevant and does not contribute directly to the face detection algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Enhanced feature selections of Adaboost training for face detection using genetic algorithm by Mohd. Zin, Zalhan

    Published 2007
    “…Generally, a large number of features are required to be selected for training purposes. Often some of these features are irrelevant and do not contribute directly to the face detection techniques. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Multi-Objective Optimization of Solar Powered Irrigation System by Using Genetic Algorithm by Mohd Tholaat, Muhammad Ali Husaini

    Published 2015
    “…Initial range of [1; 2] and crossover fraction of 1.0 have majorly contributed to the optimal search parameters. After some tuning to get the best setting, the simulation shows that the fitness function of 3 objectives resulted with 17.4303 kW power output, 15.2355% efficiency and $143,533.10 fiscal savings. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Studies on flat CORDIC implementation in field programmable gate arrays (FPGA) / Meera Subramaniam by Meera , Subramaniam

    Published 2004
    “…The CORDIC algorithm has been widely researched as an efficient hardware algorithm for the computation of trigonometric, hyperbolic and transcendental functions. …”
    Get full text
    Get full text
    Thesis
  15. 15

    CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING by ISLAM, BADAR UL ISLAM

    Published 2017
    “…To overcome these ANN problems, the Genetic Algorithm (GA) has been most frequently used for this purpose, however, some drawbacks of GA include, slow search speed and dependence on initial parameters. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Numerical analysis by Butcher, John

    Published 2008
    “…It is found that the analysis of possible methods, and algorithm design questions, makes extensive use of results and techniques from many areas within the mathematical sciences, and even contributes to them…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    Semantic analysis system by using latent semantic analysis (LSA) algorithm on khutbah texts / Ammar Zuber by Zuber, Ammar

    Published 2019
    “…With this information the system is able to produce results that can gives the user some useful information which can contribute in the later construction of khutbah texts. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Optimizing tree planting areas through integer programming and improved genetic algorithm by Md Badarudin, Ismadi

    Published 2012
    “…The algorithmic solution with some strategies mainly focuses on efficiency. …”
    Get full text
    Get full text
    Thesis