Search Results - (( based generation based algorithm ) OR ( java application design algorithm ))

Refine Results
  1. 1

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
    Get full text
    Get full text
    Article
  2. 2

    Java based expert system for selection of natural fibre composite materials by Ahmed Ali, Basheer A., Salit, Mohd Sapuan, Zainudin, Edi Syams, Othman, Mohamed

    Published 2013
    “…There are several algorithm and methods are being proposed by various researchers in this field. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Object-Oriented Programming semantics representation utilizing agents by Mohd Aris, Teh Noranis

    Published 2011
    “…A formal algorithm that can be applied to any two related Java-based source codes examples is invented to generate the semantics of these source codes. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Hybrid genetic algorithm for improving fault localization by Mahamad Zakaria, Muhammad Luqman, Sharif, Khaironi Yatim, Abd Ghani, Abdul Azim, Koh, Tieng Wei, Zulzalil, Hazura

    Published 2018
    “…This requires a technique which is specifically designed to handle multiple faults. With this regards, application of mutation analysis to localize faults might generate a vast number of mutants. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  7. 7

    Secure scheme for user authentication and authorization in android environment by Dar, Humaira, Al-Khateeb, Wajdi Fawzi Mohammed, Habaebi, Mohamed Hadi

    Published 2013
    “…Keeping in viewpoint of security on effective authentication and authorization, this paper proposes a technique that exponentially minimizes the operational cost by using secure hash algorithms that has the potential to generate mobile-based One Time Passwords (OTPs) scheme on Android environment ensuring enhanced protection with respect to password security. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Development of least square adjustment application for traversing / Harith Fadhillah Soeb by Soeb, Harith Fadhillah

    Published 2019
    “…In addition, the development stage started by perform calculation process using MATLAB software. Next, the algorithm for calculation process was generated using the Eclipse application that uses Java programming language. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…To achieve these objectives, the system adopts the Rapid Application Development (RAD) methodology, ensuring iterative design, prototyping, and user feedback integration throughout the process. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Design and development of an intuitive desktop application for rapid SARS-CoV-2 diagnosis using electrochemical potentiostat by Assaig, Faisal Ahmed, Gunawan, Teddy Surya, Nordin, Anis Nurashikin, Ab Rahim, Rosminazuin, Mohd Zain, Zainiharyati

    Published 2023
    “…Our primary focus revolved around creating a user-friendly desktop application, seamlessly integrating an algorithm that automates result generation for operators. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  12. 12
  13. 13

    Sudoku Generator based on hybrid algorithm / Faridah Abdul Rahman by Abdul Rahman, Faridah

    Published 2012
    “…The objectives this research are to investigate hybrid algorithm in game generator, to develop Sudoku generator based on hybrid algorithm and lastly to test and evaluate the Sudoku generator using time comparison. …”
    Get full text
    Get full text
    Thesis
  14. 14

    An experimental study of neighbourhood based metaheuristic algorithms for test case generation satisfying the modified condition / decision coverage criterion by Haque, Ariful

    Published 2018
    “…Often, MC/DC can reduce the number of test cases dramatically and ensure critical paths are tested. To generate test cases that satisfy MC/DC criterion, many researchers adopt neighborhood based meta-heuristics algorithms (including that of Simulated Annealing and Hill Climbing) as the problem itself is neighborhood based. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Special protection and control scheme based on generation rescheduling using differential evolution and electromagnetism-like algorithm by Hadi, Mahmaad Khalid

    Published 2016
    “…The specific aims in employing DEAM-based SPCS are to investigate a strategy to resolve the line overloading issue through the N-1 contingency based on the load flow analysis and the severity index develop SPCS scheme through the generation rescheduling strategy based on the hybrid DEAM algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An Upgrade on the Key Generation Algorithm of the GGH-MKA Lattice-Based Encryption Scheme by Arif Mandangan, Kamarulhaili, H., Asbullah, M. A.

    Published 2021
    “…In the key generation algorithm of the GGH cryptosystem, the good and bad features of the lattice bases are measured by computing orthogonality-defect value. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Sequence and sequence-less t-way test suite generation strategy based on the elitist flower pollination algorithm by Mohammed Abdullah, Abdullah Nasser

    Published 2018
    “…If t-way strategies are to be adopted in such a system, there is also a need to support test data generation based on sequence of interactions. Addressing these aforementioned issues and complementing the existing sequence based strategies such as t-SEQ, Sequence Covering Array Generator and Bee Algorithm, this thesis presents a unified strategy based on the new meta-heuristic algorithm, called the Elitist Flower Pollination Algorithm (eFPA). …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    An upgrade on the key generation algorithm of the GGH-MKA lattice-based encryption scheme by Arif, Mandangan, Kamarulhaili, Hailiza, Asbullah, Muhammad Asyraf

    Published 2021
    “…In the key generation algorithm of the GGH cryptosystem, the good and bad features of the lattice bases are measured by computing orthogonality-defect value. …”
    Get full text
    Get full text
    Article
  20. 20

    Multiple case-based retrieval for university course timetabling problem by Hong, Siaw Theng

    Published 2016
    “…The case-based retrieval technique is further enhanced and improvised into a new algorithm known as Multiple Case-based Retrieval. …”
    Get full text
    Get full text
    Thesis