Search Results - (( developing a flaws algorithm ) OR ( java implication tree algorithm ))
Search alternatives:
- java implication »
- implication tree »
- flaws algorithm »
- tree algorithm »
-
1
Reconstructing applicable chaotic Baptista-type symmetric cryptosystem
Published 2014“…We then designed a new compression algorithm developed using ideas from the Huffman coding. …”
Get full text
Get full text
Get full text
Thesis -
2
Simulated Kalman Filter algorithms for solving optimization problems
Published 2019“…Its optimality has inspired the development of a metaheuristic algorithm called Heuristic Kalman Algorithm (HKA) in 2009. …”
Get full text
Get full text
Thesis -
3
A parallel XTS encryption mode of operation
Published 2009“…The parallel XTS algorithm has shown a speedup of 1.80 (with 90% efficiency) faster than the sequential algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
4
Design and Development of Artificial Intelligence (Al)-Based Desicion Support System For Manufacturing Applications
Published 2016“…In the image processing stage, a flaw map, as described in the previous report, is used. …”
Get full text
Monograph -
5
-
6
Implementation of a parallel XTS encryption mode of operation
Published 2014“…It is known that the most efficient techniques to protect storage devices are using cryptography. Developing newer and more secure encryption algorithms and modes of operation might be critically important to protect these devices since conventional disk encryption algorithms, such as CBC mode, have shown serious security flaws. …”
Get full text
Get full text
Get full text
Article -
7
Chaotic Immune Symbiotic Organisms Search algorithm for solving optimisation problem
Published 2023“…Despite the performance of these algorithms, the flaws of these algorithms hinder them from producing high-quality results. …”
Article -
8
Lightweight PRINCE algorithm IP core for securing GSM messaging using FPGA
Published 2023“…An energy and cost-efficient implementation of PRINCE algorithm implemented in an environment of a microprocessor system using XILINX FPGA board is developed. …”
Article -
9
Mobile application for blood donation using geolocation and rule-based algorithm / Muhammad Firzan Azrai Nuzilan and Mohd Ali Mohd Isa
Published 2021“…Blood is a very important resource for humans because it acts as a medium for carrying the oxygen and nutrients to all other parts of human bodies. …”
Get full text
Get full text
Get full text
Book Section -
10
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…The research is divided into three parts, which are (1) dataset development, (2) algorithm development, and (3) algorithm performance evaluation. …”
text::Thesis -
11
A study of progressive damage detection in thin-walled composite structures using an embedded fiber Bragg grating – acoustic emission hybrid system
Published 2019“…In this work, the FBG-FPI (Fiber Bragg Brating with Fabry–Pérot Interferometer) has been applied for the FBG dynamic system, for sufficient sensitivity and less noises. Finally, a signal processing algorithm was developed to locate flaws / damages and also identify the condition of a thin composite structures. …”
Get full text
Get full text
Research Report -
12
AUTOMATED IP CAMERA: ATTENDANCE BASED APPLICATION USING FACIAL RECOGNITION
Published 2016“…The author used the Viola-Jones algorithm to detect a face and used Local Binary Patterns (LBP) to recognize the student’s faces.…”
Get full text
Get full text
Final Year Project -
13
Database encryption for a Web-based Claims System
Published 2008“…The main purpose of this study is to develop a computer system for UniMAP staff to make claims via electronic media. …”
Get full text
Thesis -
14
Image authentication using Zernike moment watermarking
Published 2013“…In this thesis, the main objective is to design and develop a watermarking system for image authentication. …”
Get full text
Get full text
Thesis -
15
A comparative study of MPPT and voltage regulator controllers for controlling output voltage in PV applications
Published 2019“…One flaw of this algorithm is that the system never stops at a fixed power point, rather it perturbs around the maximum power range. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
An intra-severity classification and adaptation technique to improve dysarthric speech recognition accuracy / Bassam Ali Qasem Al-Qatab
Published 2020“…The intra-severity adaptation of the ASR system was developed using two well-known adaptation techniques which are the Maximum Likelihood Linear Regression (MLLR) and Maximum A Posterior (MAP) as well as a combination of them. …”
Get full text
Get full text
Get full text
Thesis -
17
Human face detection from color images: preliminary result
Published 2004“…Numerous approaches have been developed and proposed to localize facial region in a single image. …”
Get full text
Get full text
Conference or Workshop Item -
18
Automated visual defect detection using deep learning
Published 2022“…A manufacturing defect is a flaw that causes a product to deviate from its intended design, thereby losing its quality and no longer having its due value. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
A study on obstacle detection for IoT based automated guided vehicle (AGV)
Published 2022“…Therefore, an IoT system is developed to allow a flexible wireless communication among mobile robots in an indoor industrial environment. …”
Get full text
Get full text
Get full text
Article -
20
Re: Gen - web-based resume generator with content recommender for it job field / Nurul Syahmina Mohd Khairuddin … [et al.]
Published 2022“…Before the project can be used by the user, a functionality testing was done to test whether the system has been developed according to the requirement and to correct any mistakes and flaws that were detected during the testing. …”
Get full text
Get full text
Get full text
Book Section
