Search Results - (( developing a flaws algorithm ) OR ( java implication tree algorithm ))

Refine Results
  1. 1

    Reconstructing applicable chaotic Baptista-type symmetric cryptosystem by Daud, Muhamad Azlan

    Published 2014
    “…We then designed a new compression algorithm developed using ideas from the Huffman coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Simulated Kalman Filter algorithms for solving optimization problems by Nor Hidayati, Abdul Aziz

    Published 2019
    “…Its optimality has inspired the development of a metaheuristic algorithm called Heuristic Kalman Algorithm (HKA) in 2009. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A parallel XTS encryption mode of operation by Alomari, Mohammad Ahmed, Samsudin, Khairulmizam, Ramli, Abdul Rahman

    Published 2009
    “…The parallel XTS algorithm has shown a speedup of 1.80 (with 90% efficiency) faster than the sequential algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Design and Development of Artificial Intelligence (Al)-Based Desicion Support System For Manufacturing Applications by Lim , Chee Peng

    Published 2016
    “…In the image processing stage, a flaw map, as described in the previous report, is used. …”
    Get full text
    Monograph
  5. 5
  6. 6

    Implementation of a parallel XTS encryption mode of operation by Alomari, Mohammad Ahmed, Samsudin, Khairulmizam, Ramli, Abdul Rahman

    Published 2014
    “…It is known that the most efficient techniques to protect storage devices are using cryptography. Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Chaotic Immune Symbiotic Organisms Search algorithm for solving optimisation problem by Zamani M.K.M., Musirin I., Suliman S.I., Mustaffa S.A.S.

    Published 2023
    “…Despite the performance of these algorithms, the flaws of these algorithms hinder them from producing high-quality results. …”
    Article
  8. 8

    Lightweight PRINCE algorithm IP core for securing GSM messaging using FPGA by Abbas Y.A., Jidin R., Jamil N., Z'aba M.R.

    Published 2023
    “…An energy and cost-efficient implementation of PRINCE algorithm implemented in an environment of a microprocessor system using XILINX FPGA board is developed. …”
    Article
  9. 9

    Mobile application for blood donation using geolocation and rule-based algorithm / Muhammad Firzan Azrai Nuzilan and Mohd Ali Mohd Isa by Nuzilan, Muhammad Firzan Azrai, Mohd Isa, Mohd Ali

    Published 2021
    “…Blood is a very important resource for humans because it acts as a medium for carrying the oxygen and nutrients to all other parts of human bodies. …”
    Get full text
    Get full text
    Get full text
    Book Section
  10. 10

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…The research is divided into three parts, which are (1) dataset development, (2) algorithm development, and (3) algorithm performance evaluation. …”
    text::Thesis
  11. 11

    A study of progressive damage detection in thin-walled composite structures using an embedded fiber Bragg grating – acoustic emission hybrid system by Mohd Hafizi, Zohari

    Published 2019
    “…In this work, the FBG-FPI (Fiber Bragg Brating with Fabry–Pérot Interferometer) has been applied for the FBG dynamic system, for sufficient sensitivity and less noises. Finally, a signal processing algorithm was developed to locate flaws / damages and also identify the condition of a thin composite structures. …”
    Get full text
    Get full text
    Research Report
  12. 12

    AUTOMATED IP CAMERA: ATTENDANCE BASED APPLICATION USING FACIAL RECOGNITION by HASHIM, MOHD ASYRAF

    Published 2016
    “…The author used the Viola-Jones algorithm to detect a face and used Local Binary Patterns (LBP) to recognize the student’s faces.…”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…The main purpose of this study is to develop a computer system for UniMAP staff to make claims via electronic media. …”
    Get full text
    Thesis
  14. 14

    Image authentication using Zernike moment watermarking by Shojanazeri, Hamid

    Published 2013
    “…In this thesis, the main objective is to design and develop a watermarking system for image authentication. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A comparative study of MPPT and voltage regulator controllers for controlling output voltage in PV applications by Al-Mohammedawi, Ali Jber Mshkil

    Published 2019
    “…One flaw of this algorithm is that the system never stops at a fixed power point, rather it perturbs around the maximum power range. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    An intra-severity classification and adaptation technique to improve dysarthric speech recognition accuracy / Bassam Ali Qasem Al-Qatab by Bassam Ali Qasem, Al-Qatab

    Published 2020
    “…The intra-severity adaptation of the ASR system was developed using two well-known adaptation techniques which are the Maximum Likelihood Linear Regression (MLLR) and Maximum A Posterior (MAP) as well as a combination of them. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Human face detection from color images: preliminary result by Chuan, T. S., Setan, Halim, Majid, Zulkepli

    Published 2004
    “…Numerous approaches have been developed and proposed to localize facial region in a single image. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Automated visual defect detection using deep learning by Loh, Xiao

    Published 2022
    “…A manufacturing defect is a flaw that causes a product to deviate from its intended design, thereby losing its quality and no longer having its due value. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    A study on obstacle detection for IoT based automated guided vehicle (AGV) by Loh, Jit Hao, M. Nafis, O. Z.

    Published 2022
    “…Therefore, an IoT system is developed to allow a flexible wireless communication among mobile robots in an indoor industrial environment. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Re: Gen - web-based resume generator with content recommender for it job field / Nurul Syahmina Mohd Khairuddin … [et al.] by Mohd Khairuddin, Nurul Syahmina, Ahmadon, Fadzlin, Hashim, Madihah Hannani, Mohd Vauxhall, Nur Ain Emylia

    Published 2022
    “…Before the project can be used by the user, a functionality testing was done to test whether the system has been developed according to the requirement and to correct any mistakes and flaws that were detected during the testing. …”
    Get full text
    Get full text
    Get full text
    Book Section