Search Results - (( construct security optimization algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- security optimization »
- java application »
- construct »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Optimization of medical image steganography using n-decomposition genetic algorithm
Published 2023“…The Least Significant Bits (LSB) technique has been widely used for secure communication. However, it is susceptible to imperceptibility and security risks due to the direct manipulation of pixels, and ASCII patterns present limitations. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
-
5
-
6
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
7
Crossover and mutation operators of real coded genetic algorithms for global optimization problems
Published 2016“…Because the representations of the solutions are similar to the natural formulation, RCGA gets better-customized to the optimization of problems in a continuous domain. Throughout the years, there has been a shift in focus on constructing new crossover and mutation operators to improve the performance of GA in function optimization. …”
Get full text
Get full text
Thesis -
8
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004“…For this project, 2 different optimized designs were implemented. The first design (Design I) was implemented with minimum hardware resources usage, using a single F -Function (modified) and was optimized with reasonable latency, throughput and throughput per gate. …”
Get full text
Get full text
Final Year Project -
9
Secure IIoT-enabled industry 4.0
Published 2021Get full text
Get full text
Get full text
Get full text
Get full text
Article -
10
Optimization Of Twofish Encryption Algorithm On FPGA
Published 2005“…For this project, 2 different optimized designs were implemented. The first design (Design I) was implemented with minimum hardware resources usage, using a single F -Function (modified) and was optimized with reasonable latency, throughput and throughput per gate. …”
Get full text
Conference or Workshop Item -
11
A neural network modal decomposition mechanism in predicting network traffic
Published 2023“…The proposed mechanism starts by using SABC to update the model with a new solution and fine-tune the disturbances in each iteration to deal with the interference in order to find the best values that are also synchronously optimal. The SAVE-AS then constructs an adaptive selection operator. …”
Get full text
Get full text
Get full text
Thesis -
12
Data-driven rice yield predictions and prescriptive analytics for sustainable agriculture in Malaysia
Published 2024“…A comprehensive dataset for rice yield prediction in Malaysia was constructed, encompassing yield data from 2014 to 2018. …”
Get full text
Get full text
Get full text
Article -
13
ReSTiNet: An efficient deep learning approach to improve human detection accuracy
Published 2023“…Despite modern techniques, there are very few optimal techniques to construct networks with a small size, deep architecture, and fast training time while maintaining accuracy. …”
Get full text
Get full text
Get full text
Article -
14
A new integrated approach for evaluating sustainable development in the electric vehicle sector
Published 2025“…This study identifies the relative importance of the classification attribute variables based on the classification rules of the target attributes by conducting further analysis with the CART decision model and constructs an optimal prediction model.…”
Get full text
Get full text
Get full text
Get full text
Article -
15
ReSTiNet: An Efficient Deep Learning Approach to Improve Human Detection Accuracy
Published 2023“…Despite modern techniques, there are very few optimal techniques to construct networks with a small size, deep architecture, and fast training time while maintaining accuracy. …”
Get full text
Get full text
Article -
16
ReSTiNet : An efficient deep learning approach to improve human detection accuracy
Published 2023“…Despite modern techniques, there are very few optimal techniques to construct networks with a small size, deep architecture, and fast training time while maintaining accuracy. …”
Get full text
Get full text
Get full text
Article -
17
