Search Results - (( developing building parallel algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    Efficient Malware Detection And Response Model Using Enhanced Parallel Deep Learning (EPDL-MDR) by Chowdhury Sajadul Islam

    Published 2026
    “…The three main objectives are: (i) to develop a malware RGB image-based dataset and classifier using a parallel CNN (PCNN), (ii) to develop an enhanced parallel deep learning (EPDL) model for malware detection (MD) and build a response system (RS) by applying PCNN, and (iii) to evaluate the developed model with previous studies based on the accuracy rate. …”
    thesis::doctoral thesis
  2. 2

    Parallel Implementation Of Field Visualizations With High Order Tetrahedral Finite Elements by Ishak, Mohammad Hafifi Hafiz

    Published 2013
    “…The results show that computational times taken in the data post-processing significantly decreases when multicore parallel processing is enabled. The developed algorithm was assessed on various problem geometries with considerable high number of unknowns where it is found that the approach is quite scalable.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Parallel processing in Compute Unified Device Architecture (CUDA) for energy saving glass by Shibghatullah, Abdul Samad, Xia, Khoo Wen, Azmin, Farah Ayuni, Mohd Johar, Fauzi

    Published 2014
    “…One way to allow more useful signals to go through the glass is by using complex shape coating structure. In order to develop a complex coating structure, genetic algorithm technique is used in this research. …”
    Get full text
    Get full text
    Article
  4. 4

    Customised fitness function of evolutionary algorithm for optimization of car park space / Ahmad Syahir Ab. Aziz by Ab. Aziz, Ahmad Syahir

    Published 2017
    “…Genetic algorithm is chosen for the development of the prototype to prove that genetic algorithm is the best technique to implement for optimization. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM) by Shuwandy, Moceheb Lazam

    Published 2012
    “…Researchers were developed this method for the protection of this algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    Forward-Backward Time Stepping with Automated Edge-preserving Regularization Technique for Wood Defects Detection by Yong, Guang

    Published 2019
    “…The FBTS integrated with automated edge-preserving regularization algorithm is implemented in C++ programming language executed in parallel computing. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    High efficiency RF power amplifier with closed loop system for public safety radio communications / Lokesh Anand Vijayakumaran by Lokesh Anand, Vijayakumaran

    Published 2019
    “…Firstly, a parallel-combined impedance matching technique is introduced where it enables the designers to develop broadband PA with actual PA device impedance. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    On line fault detection for transmission line using power system stabilizer signals by Ali Falifla, Hamza AbuBeker

    Published 2007
    “…Hence, this study will show that not only the PSS able to compensate the damping due to the disturbance but also by using the developed algorithm it succeeds to detect and classify the fault conditions on the parallel transmission lines.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA by Ahmed, Shakil

    Published 2013
    “…In addition AES-XTS decryption modules were also designed. Also the parallel AES-XTS encryption and decryption design were used to develop integrated chip of AES-XTS on FPGA. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Fluid-solid conjugate heat transfer modelling using weakly compressible smoothed particle hydrodynamics by Ng, Khai Ching, Ng, Y.L., Sheu, Tony Wen Hann, Mukhtar, Azfarizal

    Published 2019
    “…On the modelling of non-isothermal hydrodynamically fully-developed channel flow, the Dirichlet inlet temperature boundary condition was implemented without having to build a separate temperature reset zone as proposed in the open literature. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Efficient reconfigurable architectures for 3-D medical image compression by Ahmad, Afandi

    Published 2010
    “…These have provided an impetus to the development of other applications, in particular telemedicine and teleradiology. …”
    Get full text
    Get full text
    Thesis