Search Results - (( developing nation new algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- java application »
- new algorithm »
- nation new »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
3
A new 128-bit block cipher
Published 2009“…Every country has different requirements when requesting block cipher so there is no limit in developing them. According to the National IT Council (NlTC) report on "Securing Malaysia Sovereignty in the CyberWorld" provided by Ministry of Science, Technology and Innovation, Malaysia, they have outlined critical areas in which new and additional research and development is needed to increase the protection of the national information infrastructure. …”
Get full text
Get full text
Thesis -
4
Analysis and Modification of Grain - 128 Stream Cipher Algorithm
Published 2024thesis::master thesis -
5
Estimation-based Metaheuristics: A New Branch of Computational Intelligence
Published 2016Get full text
Get full text
Conference or Workshop Item -
6
Performance enhancement of AIMD algorithm for congestion avoidance and control
Published 2011“…The contribution of this research is to improve the performance of AIMD in terms of efficiency (the network utilization) and fairness. National Chiao Tung University’s network simulation (NCTUns) has been used in this development to compare the new algorithm with the older versions and determine its advantages over the older versions. …”
Get full text
Get full text
Thesis -
7
A security payment model for financial payment using mykad
Published 2011“…A system with security technique named Arbitrary Random Security Algorithm (ARSA) and a one-to-one multithreading model need to be developed in order to accelerate the authentication response time of MPM. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Sentiment analysis on national cultural tourism using Linear Support Vector Machine (LSVM) / Nur Haida Hanna Samsuddin
Published 2020“…Moreover, negative reviews may impact the national tourism. This study will perform sentiment analysis on national cultural tourism of tourists reviews on TripAdvisor website. …”
Get full text
Get full text
Thesis -
10
A new KD-3D-CA block cipher with dynamic S boxes based on 3D cellular automata
Published 2019“…The module of a KD-3DCA block cipher is designed and algorithms of the new KD-3D-CA block cipher are generated. …”
Get full text
Get full text
Thesis -
11
Optimal source substation location selection in radial distribution networks
Published 2004Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Development of an integrated scheduling model for handling equipment in automated port container terminals
Published 2014“…As the integrated scheduling of handling equipment is a “non-deterministic polynomialtime hard” (NP-hard) problem and also the computation time and ease of application are so important for real practices of the scheduling methods, So a meta-heuristic algorithm based on Genetic Algorithm is developed, in which, new operators create solutions considering the constraints of the problem and also a heuristic rule proposed which assigns the ALVs to the tasks. …”
Get full text
Get full text
Thesis -
13
Hybrid Neural Networks and Genetic Algorithm for Fault Detection and Diagnosis of a Plant
Published 2008Get full text
Get full text
Conference or Workshop Item -
14
Wearable based-sensor fall detection system using machine learning algorithm
Published 2021“…As nations develop and prosper economically, their population ages longer and requires extra healthcare. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Physical and computational modeling for finite element analysis
Published 1988Get full text
Get full text
Conference or Workshop Item -
16
An Improved Rectangle Lightweight Block Cipher Based On 3d Rotation Method
Published 2024thesis::doctoral thesis -
17
-
18
Self-driving car with Artificial Intelligence (AI) technology / Asrul Amin Mohd Isa ... [et al.]
Published 2023“…Artificial Intelligence (AI) is crucial in operating the autonomous car systems. The National Automotive Policy 2020 (NAP 2020) aims to grow Malaysia’s automotive sector through research and development of new technologies, especially in the fields of Next-Generation Vehicles (NxGV), Industrial Revolution 4.0 (IR 4.0), and Mobility-as-a-Service (MaaS). …”
Get full text
Get full text
Get full text
Article -
19
An even and odd situation for the multiplier of scalar multiplication with pseudo τ-adic non-adjacent form
Published 2015Get full text
Get full text
Conference or Workshop Item -
20
Semantic-Based Scalable Decentralized Resource Discovery
Published 2010Get full text
Get full text
Conference or Workshop Item
