Search Results - (( developing consumer protection algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- protection algorithm »
- developing consumer »
- java application »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Special protection and control scheme based on generation rescheduling using differential evolution and electromagnetism-like algorithm
Published 2016“…The main objective of this research is designing a Special Protection and Control Scheme (SPCS) based on a hybrid approach of combining Differential Evolution (DE) and Electromagnetism-Like algorithms. …”
Get full text
Get full text
Thesis -
3
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
4
Algorithm for the legal regulation of internet financial crime
Published 2024“…To prevent crime, attention towards effective control of Internet finance crime has grown, emphasizing the protection of consumers’ rights, reduction of economic damage, and promotion of Internet finance development. …”
Get full text
Get full text
Get full text
Article -
5
Hardware Implementation Of Rc4a Stream Cipher Algorithm
Published 2007“…The designed hardware consumed 480 logic elements, 146 I/Os, and 10,240 bits memory. …”
Get full text
Get full text
Thesis -
6
-
7
Evaluation of SongketChain : A Framework to Protect Unique Cultural Product using Blockchain Technology
Published 2025“…By leveraging both public and private blockchain technologies, SongketChain offers a novel approach to securing pattern rights and supply chain logistics, ensuring that each Songket product's journey from weaver to consumer is documented and verifiable. This study evaluates the effectiveness of SongketChain through a comparative analysis of blockchain platforms and consensus algorithms, highlighting the framework's potential to mitigate counterfeit issues and support the sustainable development of the Songket market. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
AI recommendation penetration testing tool for SQL injection: linear regression
Published 2025“…This technique involves the development and implementation of an algorithm designed to improve the efficiency of security evaluations by suggest the suitable penetration testing tools. …”
Get full text
Get full text
Get full text
Article -
9
Preprocessing method for assistive listening system
Published 2021“…Accepting a high level of noise would lead to the system algorithm being corrupted. The ALS function is to protect workers from a high level of noise that leads to hearing loss. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Preprocessing method for assistive listening system
Published 2021“…Accepting a high level of noise would lead to the system algorithm being corrupted. The ALS function is to protect workers from a high level of noise that leads to hearing loss. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Regenerative braking strategy for electric vehicles using improved adaptive genetic algorithm
Published 2017“…It is a time-consuming task to model and develop a regenerative braking strategy. …”
Get full text
Get full text
Thesis -
12
-
13
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…MAS is a collection of agents that have been applied to several power system problems such as, those in operation, markets, diagnosis and protection. In this study, in order to assess the system reliability, distribution protection system design and coordination, two models of MAS techniques to determine the suitability of the Distributed Generator (DG) location based on power system reliability and new index reliability of the relay operating time are proposed. …”
Get full text
Get full text
Thesis -
14
Salsa20 based lightweight security scheme for smart meter communication in smart grid
Published 2023“…The traditional power gird is altering dramatically to a smart power grid with the escalating development of information and communication technology (ICT). …”
Article -
15
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
Published 2017“…To ensure higher security level, the developed system is implemented using the NIST-certified XTS-AES block encryption algorithm. …”
Get full text
Get full text
Get full text
Thesis -
16
Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA
Published 2013“…One of the components of this standard is the cryptographic protection of data on block-storage devices. This standard uses AESXTS as a building block for the protection of data. …”
Get full text
Get full text
Thesis -
17
Spatial Data Mining Model For Landfill Sites Suitability Mapping Based On Neural Networks And Multivariate Analysis
Published 2017“…It can be an alternative to the existing time-consuming methodologies for selecting relevant criteria. …”
Get full text
Get full text
Thesis
