Search Results - (( developing nation techniques algorithm ) OR ( java application modified algorithm ))

Refine Results
  1. 1
  2. 2

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas by Sulong, Siti Masrina

    Published 2002
    “…Raw fingerprint images and filtered images (noise removal and enhancement) are tested to determine the efficiency of the algorithm developed. The improved algorithm has applied to 350 image samples obtained from National Institute of Standards and Technology (NIST). …”
    Get full text
    Get full text
    Thesis
  6. 6

    Sentiment analysis on national cultural tourism using Linear Support Vector Machine (LSVM) / Nur Haida Hanna Samsuddin by Samsuddin, Nur Haida Hanna

    Published 2020
    “…Therefore, the chosen technique is classification and the algorithm that will be applied in the classification process is Linear Support Vector Machines (LSVM). …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Cross-cultural innovation: enhancing the Japanese Moku-zogan technique by Wan Omar, Wan Noor Faaizah, Subri, Shafilla, Ab Hamid, Abu Hanifa

    Published 2025
    “…In a groundbreaking fusion of cultural identities and craftsmanship, we developed a series of ten console tables utilizing the traditional Japanese Moku-zogan technique, tailored to embody a harmonious blend of Malaysian and Japanese aesthetics. …”
    Get full text
    Get full text
    Get full text
    Monograph
  9. 9
  10. 10
  11. 11

    Genetic Algorithm for Forecasting Bioinformatic Outcomes of Mutation-induced Cowpeas for Sustainable Development by Kehinde, Okewu, Emmanuel, Okewu, Wong, Ling Shing, Siti Sarah, Maidin

    Published 2023
    “…The aim of this work is to address malnutrition, immune deficiency, hunger, and poverty as canvassed in United Nations Sustainable Development Goals 1 and 2 (SDGs 1 and 2). …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A security payment model for financial payment using mykad by Ahmad Zahari, Nurul Huda

    Published 2011
    “…A system with security technique named Arbitrary Random Security Algorithm (ARSA) and a one-to-one multithreading model need to be developed in order to accelerate the authentication response time of MPM. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Statistical computing for forensic firearm pattern identification: Evaluating a fisher linear discriminant analysis-based algorithm against fixed-impulse noise by Chuan, Zun Liang, Abraham Lim, Bing Sern, Tan, Chek Cheng, Abdul Aziz, Jemain, Liong, Choong-Yeun

    Published 2025
    “…Furthermore, this study aligns with the United Nations Sustainable Development Goals (SDGs), particularly SDG9 (Industry, Innovation, and Infrastructure), by fostering Artificial Intelligence (AI)-driven forensic advancements and SDG16 (Peace, Justice, and Strong Institution) by strengthening forensic accuracy in criminal investigations, ultimately contributing to national security and judicial efficiency.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    The Potential of High Density Scanner Technique for Terrestrial Surface Displacement Studies in Malaysia

    Published 2009
    “…HDS technology is a surveying method conceived more than ten years ago that in a short time can supply DSM (Digital Surface Model) and good quality DTM as a result of elaborations with specific filtering and interpolation algorithms; only recently has this technique shown growth in development and applications. …”
    Get full text
    Conference or Workshop Item
  17. 17

    Development of Sense and Avoid system based on multi sensor integration for unmanned vehicle system by Legowo, Ari, Ramli, M. Faiz, Syafiq Shamsudin, Syariful

    Published 2016
    “…Subsequently, once the algorithms are put together, including maneuvers avoidance technique algorithm, the developed SAA system will be experimentally tested in order to validate and evaluate the overall capability of the system.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    Investigation of load variant under power distribution network reconfiguration using EPSO algorithm by Sulaima, Mohamad Fani, Wong, Kok Loong, Bohari, Zul Hasrizal, Mohd Nasir, Mohamad Na'im

    Published 2024
    “…Furthermore, the test result also indicated that the EPSO algorithm produced better results in terms of convergence time compared to the conventional PSO algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Application of data mining techniques for economic evaluation of air pollution impact and control by Lukman, Iing

    Published 2007
    “…In this research we examine aspects of the interdependence between economic development and the use of environmental and natural resources assets from global data published by United Nations. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis