Search Results - (( ((using function) OR (using action)) methods algorithm ) OR ( java application _ algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The only way to read the messages is to know the method and the algorithm used in this project, which only the sender and the receiver will have the special key. …”
    Get full text
    Get full text
    Student Project
  4. 4

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Genetic Algorithms In Optimizing Membership Function For Fuzzy Logic Controller by Ismail, H. Muh Yusuf

    Published 2010
    “…Thus it is important to select the accurate membership functions but these methods possess one common weakness where conventional FLC use membership function and control rules generated by human operator. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…This research was undertaken to develop methods to mitigate shoulder-surfing attack. Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Network monopoly / Tan Kean Yeap by Tan , Kean Yeap

    Published 2002
    “…The main aspect of this thesis is to produce a network monopoly system, which process multiple game sessions concurrently, enabling users to play the graphical game with people within the network. The algorithm design and implementation method mustnot only be workable, but also highly efficient in terms of execution speed and respond time. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Tacit knowledge for business intelligence framework using cognitive-based approach by Surbakti, Herison

    Published 2022
    “…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
    Get full text
    Get full text
    Thesis
  10. 10

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  11. 11
  12. 12
  13. 13

    A fuzzy approach for early human action detection / Ekta Vats by Ekta, Vats

    Published 2016
    “…Most existing methods deal with the detection of an action after its completion. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Optimal Maintenance Scheduling for Multi-Component E-Manufacturing System by Arab, Ali

    Published 2009
    “…These values are used to define the objective function’s parameters. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Deep Reinforcement Learning For Control by Bakar, Nurul Asyikin Abu

    Published 2021
    “…The complete project is carried out in the CARLA simulator to determine how to operate in discrete action space using Deep Reinforcement Learning (DRL) algorithms. …”
    Get full text
    Get full text
    Monograph
  18. 18

    STUDIES ON COMPARISON OF PROPORTIONAL ON ERROR WITH PROPORTIONAL ON MEASURED VALUE IN PID CONTROLLERS by WAN MOHD RUSHIDI, WAN AMIR HAKIMI

    Published 2019
    “… PID Controllers have different algorithms or methods in which the controller action is based on Error or Process Variable (PV). …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Obstacle avoidance robot using sonar sensor (OARuS) by Mohamad Sabri Abdullah

    Published 2008
    “…An embedded controller function as total guard actions that made by robot, it will receive, processing, and define data (input), and decide what that should do by robot to further action. …”
    Get full text
    Learning Object
  20. 20

    An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization by Mizher, Manar Abduljabbar Ahmad, Ang, Mei Choo, Sheikh Abdullah, Siti Norul Huda, Kok, Weng Ng

    Published 2019
    “…We then evaluated the Improved AKF algorithm with the-state-of-the-art algorithms in terms of compression ratio using Paul videos and Shih-Tang dataset. …”
    Get full text
    Get full text
    Article