Search Results - (( developing level based algorithm ) OR ( java validation using algorithm ))

Refine Results
  1. 1

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…Then, traffic is fitted to best traffic model and percentage level Policing and Shaping algorithm is developed to control the bandwidth used. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An efficient real-time terrain data organization and visualization algorithm based on enhanced triangle-based level of detail technique by Zamri, Muhamad Najib

    Published 2006
    “…The purpose of this research is to design, develop and implement an algorithm for enhancing the rendering efficiency of triangle-based LOD technique. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A simplified synchronous reference frame for indirect current controlled three-level inverter-based shunt active power filters by Hoon, Yap, Mohd Radzi, Mohd Amran, Hassan, Mohd Khair, Mailah, Nashiren Farzilah, Abdul Wahab, Noor Izzri

    Published 2016
    “…This paper presents a new simplified harmonics extraction algorithm based on the synchronous reference frame (SRF) for an indirect current controlled (ICC) three-level neutral point diode clamped (NPC) inverter-based shunt active power filter (SAPF). …”
    Get full text
    Get full text
    Article
  11. 11

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution: article / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…The objective of this research is to characterize inbound internet traffic collected on real live IP-based campus network. Then, traffic is fitted to best traffic model and percentage level Policing and Shaping algorithm is developed to control the bandwidth used. …”
    Get full text
    Get full text
    Article
  12. 12

    Enhanced Instantaneous Power Theory with average algorithm for indirect current controlled three-level inverter-based shunt active power filter under dynamic state conditions by Hoon, Yap, Mohd Radzi, Mohd Amran, Hassan, Mohd Khair, Mailah, Nashiren Farzilah

    Published 2016
    “…An enhanced harmonics extraction algorithm based on Instantaneous Power (PQ) Theory is proposed for indirect current controlled (ICC) three-level neutral point diode clamped (NPC) inverter-based shunt active power filter (SAPF). …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Enhanced control algorithms for multilevel inverter-based shunt active power filter by Hoon, Yap

    Published 2017
    “…Therefore, the main aim of this work is to develop new control algorithms which are capable of improving mitigation and dynamic performances of three-level neutralpoint diode clamped (NPC) inverter-based SAPF. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Natural image noise level estimation based on local statistics for blind noise reduction by Khmag, Asem, Ramli, Abd Rahman, Sy Mohamed, Sy Abd Rahman Al-haddad, Kamarudin, Noraziahtulhidayu

    Published 2018
    “…In this study, a patch-based estimation technique is used to estimate for noise level and applies it to the proposed blind image denoising algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    DC-link capacitor voltage regulation with effort-reduction fuzzy logic control for three-level inverter-based shunt active power filter by Mailah, Nashiren Farzilah, Yap, Hoon, Mohd Radzi, Mohd Amran

    Published 2017
    “…This paper presents a fuzzy-based DC-link capacitor voltage regulation algorithm with reduced computational efforts to enhance performance of three-phase three-level neutral-point diode clamped (NPC) inverter-based SAPF in overall DC-link voltage regulation. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Water level forecasting using feed forward neural networks optimized by African Buffalo Algorithm (ABO) by Ahmed, Ehab Ali

    Published 2019
    “…This development goal is to reduce the impact of water variation in river water levels. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Development of a user-adaptable human fall detection based on fall risk levels using depth sensor by Nizam, Yoosuf, Haji Mohd, Mohd Norzali, Abdul Jamil, M. Mahadi

    Published 2018
    “…Related studies have employed wearable, non-invasive sensors, video cameras and depth sensor-based approaches to develop such monitoring systems. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Development of a user-adaptable human fall detection based on fall risk levels using depth sensor by Nizam, Yoosuf, Haji Mohd, Mohd Norzali, Abdul Jamil, Muhammad Mahadi

    Published 2018
    “…Related studies have employed wearable, non-invasive sensors, video cameras and depth sensor-based approaches to develop such monitoring systems. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    A novel scheduling algorithm based on game theory and multicriteria decision making in LTE network by Hindia, M.N., Reza, A.W., Noordin, K.A.

    Published 2015
    “…On the second level, TOPSIS algorithm allocates the resources among application's users based on their criteria and the application's preferences. …”
    Get full text
    Get full text
    Get full text
    Article