Search Results - (( developing line selection algorithm ) OR ( java data function algorithm ))

Refine Results
  1. 1

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Development of a Tuneable Test Problem Generator for Assembly Sequence Planning and Assembly Line Balancing by M. F. F., Ab Rashid, Hutabarat, Windo, Tiwari, Ashutosh

    Published 2012
    “…Numerous research works in assembly sequence planning and assembly line balancing mainly focus on developing algorithms to solve problems and to optimise assembly sequence planning and assembly line balancing. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Optimization of assembly line balancing with energy efficiency by using tiki-taka algorithm by Ariff Nijay, Ramli

    Published 2023
    “…Lastly, a study of the industrial case was performed as a validation of the developed model and algorithm. An automotive company is selected, and the collected actual data is used for validation purposes. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Development of straight line robot movement by Ching, Wai Hoong

    Published 2012
    “…This project focuses on the development of straight line movement for a four wheeled mobile robot. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Path planning for unmanned aerial vehicles using visibility line-based methods by Omar, Rosli

    Published 2011
    “…The proposed 2D path planning algorithms, on the contrary, select a relatively smaller number of vertices using the so-called base line (BL), thus they are computationally efficient. …”
    Get full text
    Get full text
    Thesis
  8. 8

    DEVELOPMENT OF A NUMERICAL OPTIMIZATION TOOL FOR FPSO MOORING LINE PARAMETERS by AHMED JA’E, IDRIS

    Published 2023
    “…The numerical tool is an integration of a RegPSO algorithm (developed in MATLAB) and a commercial software OrcaFlex, with the capability to simultaneously optimize azimuth angles, line radius, line length, and line diameter of turret FPSO.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Development of Phasor Measurement Unit Based Fault Detection and Faulty Line Classification in Electrical Power System by Muhammad Qasim, Khan

    Published 2019
    “…Thirdly, for a faulty line classification (FLC), this study develops the current angles differential scheme by introducing unwrapped dynamic phase angles using the modified PMU measurements. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Development of Straight Line Robot Movement Using Digital Compas Module by Wan Ismail, Ibrahim, Mohd Riduwan, Ghazali, Mohd Zaidi, Mohd Tumari

    Published 2012
    “…This project focuses on the development of straight line movement for a four-wheeled mobile robot. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Autonomous Positioning Of Unmanned Aerial Vehicle (UAV) For Power Lines Insulator Detection by Sze Sin, Voon, Kho, Lee Chin, Ngu, Sze Song, Annie, Joseph, Kuryati, Kipli

    Published 2024
    “…The machine learning algorithms are utilised to identify and calculate the length of power line insulators. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Modeling of a ground wire using TLM by Wan Ahmad, Wan Fatinhamamah, Thomas, D. W. P., Christopoulos, C.

    Published 2008
    “…This work is aimed at developing electromagnetic modeling techniques to enable researchers to predict the behaviors of substation grounding system to lightning strikes using a 1-D transmission-line model. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line by Olufemi, Osaji Emmanuel

    Published 2020
    “…The healthy lines extracted fault signals' functional signature are added to the earlier deployed faulty-line decomposed dataset, operation parameters, and changing network topology information from the SCADA logged reports without communication channel use. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Software product line test list generation based on harmony search algorithm with constraints support by Alsewari, Abdulrahman A., Kabir, M. Nomani, Kamal Z., Zamli, Alaofi, Khalid S.

    Published 2019
    “…Thus, the current study is aimed to develop a new SPL test list generation strategy based on Harmony Search (HS) algorithm, namely SPL-HS. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Process Sequencing Modeled as TSP with Precedence Constraints - A Genetic Algorithm Approach by N. M., Razali

    Published 2014
    “…In this study a new genetic algorithm (GA) procedure is developed which includes chromosome’s repairing strategy based topological sort to handle the precedence constraints and to generate only feasible solution during the evolutionary process. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Classification model for hotspot occurrences using spatial decision tree algorithm by Sitanggang, Imas Sukaesih, Yaakob, Razali, Mustapha, Norwati, Nuruddin, Ahmad Ainuddin

    Published 2013
    “…As the ID3 algorithm that uses information gain in the attribute selection, the proposed algorithm uses spatial information gain to choose the best splitting layer from a set of explanatory layers. …”
    Get full text
    Get full text
    Get full text
    Article