Search Results - (( developing consumer protection algorithm ) OR ( java application optimisation algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Special protection and control scheme based on generation rescheduling using differential evolution and electromagnetism-like algorithm by Hadi, Mahmaad Khalid

    Published 2016
    “…The main objective of this research is designing a Special Protection and Control Scheme (SPCS) based on a hybrid approach of combining Differential Evolution (DE) and Electromagnetism-Like algorithms. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Algorithm for the legal regulation of internet financial crime by Ambaras Khan, Hanna, Ab. Rahman, Suhaimi, Xinxin, Mao

    Published 2024
    “…To prevent crime, attention towards effective control of Internet finance crime has grown, emphasizing the protection of consumers’ rights, reduction of economic damage, and promotion of Internet finance development. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Hardware Implementation Of Rc4a Stream Cipher Algorithm by Al Noman, Abdullah

    Published 2007
    “…The designed hardware consumed 480 logic elements, 146 I/Os, and 10,240 bits memory. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Evaluation of SongketChain : A Framework to Protect Unique Cultural Product using Blockchain Technology by Muhammad Hassif Imran, Muhammad Harris Irwan, Johari, Abdullah, Adnan Shahid, Khan, Nayeem Ahmad, Khan

    Published 2025
    “…By leveraging both public and private blockchain technologies, SongketChain offers a novel approach to securing pattern rights and supply chain logistics, ensuring that each Songket product's journey from weaver to consumer is documented and verifiable. This study evaluates the effectiveness of SongketChain through a comparative analysis of blockchain platforms and consensus algorithms, highlighting the framework's potential to mitigate counterfeit issues and support the sustainable development of the Songket market. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    AI recommendation penetration testing tool for SQL injection: linear regression by Ahmad Fuad, Norshahira Elliyana, Saad, Shahadan

    Published 2025
    “…This technique involves the development and implementation of an algorithm designed to improve the efficiency of security evaluations by suggest the suitable penetration testing tools. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Preprocessing method for assistive listening system by Muhammad Nur Adri, Nawi

    Published 2021
    “…Accepting a high level of noise would lead to the system algorithm being corrupted. The ALS function is to protect workers from a high level of noise that leads to hearing loss. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    Preprocessing method for assistive listening system by Muhammad Nur Adri, Nawi

    Published 2021
    “…Accepting a high level of noise would lead to the system algorithm being corrupted. The ALS function is to protect workers from a high level of noise that leads to hearing loss. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    Regenerative braking strategy for electric vehicles using improved adaptive genetic algorithm by Taleghani, Hussein

    Published 2017
    “…It is a time-consuming task to model and develop a regenerative braking strategy. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…MAS is a collection of agents that have been applied to several power system problems such as, those in operation, markets, diagnosis and protection. In this study, in order to assess the system reliability, distribution protection system design and coordination, two models of MAS techniques to determine the suitability of the Distributed Generator (DG) location based on power system reliability and new index reliability of the relay operating time are proposed. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Salsa20 based lightweight security scheme for smart meter communication in smart grid by Reza S.M.S., Arifeen M.M., Tiong S.K., Akhteruzzaman M., Amin N., Shakeri M., Ayob A., Hussain A.

    Published 2023
    “…The traditional power gird is altering dramatically to a smart power grid with the escalating development of information and communication technology (ICT). …”
    Article
  15. 15

    An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices by Alomari, Mohammad Ahmed Mohammad

    Published 2017
    “…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA by Ahmed, Shakil

    Published 2013
    “…One of the components of this standard is the cryptographic protection of data on block-storage devices. This standard uses AESXTS as a building block for the protection of data. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Spatial Data Mining Model For Landfill Sites Suitability Mapping Based On Neural Networks And Multivariate Analysis by Abujayyab, Sohaib K. M.

    Published 2017
    “…It can be an alternative to the existing time-consuming methodologies for selecting relevant criteria. …”
    Get full text
    Get full text
    Thesis