Search Results - (( developing practical action algorithm ) OR ( java application matching algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Active force control with iterative learning control algorithm for a vehicle suspension by Rosmazi, Rosli

    Published 2013
    “…A number of ILC algorithms were explicitly employed to compute the estimated mass in the AFC loop that is necessary to trigger the control action. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Moderating role of management support in the relationship between human resource practices and employee performance: A study of academics in Nigerian Polytechnics by Bida, Mohammed Jibrin

    Published 2018
    “…The finding indicated that effective HR practices (recruitment and selection, training and development, and succession planning) enhanced employee performance; thus, organisations should entrench such HR practices in an effective manner. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    A conceptual framework for multi-objective optimization of building performance: Integrating intelligent algorithms, simulation tools, and climate adaptation by Rong, Li, Shari, Zalina, Ab Kadir, Mohd Zainal Abidin

    Published 2025
    “…Overall, the study contributes a holistic perspective and actionable methodology for advancing intelligent, climate-adaptive building performance optimization.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A novel softsign fractional-order controller optimized by an intelligent nature-inspired algorithm for magnetic levitation control by Ahmad, Mohd Ashraf, Izci, Davut, Ekinci, Serdar, Mohd Tumari, Mohd Zaidi

    Published 2025
    “…The performance of the proposed approach was extensively benchmarked against four modern metaheuristic algorithms (greater cane rat algorithm, catch fish optimization algorithm, RIME algorithm and artificial hummingbird algorithm) under identical conditions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Enhancement of impact force determination with modal transformation method by using integration and data filtering /Khoo Shin Yee by Khoo, Shin Yee

    Published 2013
    “…Discovering the in-service dynamic forces, their location and their line of action regarding the structure are necessary during its design, development and modification stages. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Preserving the confidentiality of final examination question paper using image steganography technique / Aviefieorennia Tompell by Tompell, Aviefieorennia

    Published 2016
    “…The quality of the education system and the achievement of its objective are exposed to a serious threat with actions and practices that weaken the credibility of examination. …”
    Get full text
    Get full text
    Student Project
  16. 16

    Analysis of Traffic Accident Patterns Using Association Rule Mining by Yudy, Pranata, Tri Basuki, Kurniawan, Edi Surya, Negara, Ahmad Haidar, Mirza

    Published 2024
    “…This study also demonstrated the practicality of the apriori algorithm in analyzing extensive datasets to extract actionable insights. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Development of process framework for ontology construction through ontology mapping / Syerina Azlin Md Nasir by Md Nasir, Syerina Azlin

    Published 2016
    “…This framework is then verified by an expert in framework development and two experts in ontology constructions. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    A Hybrid Machine Learning and Optimisation-Based Model for Predicting the Success of Business-To-Consumer Software Development Projects in Indonesia by Setiawan, Rudi

    Published 2025
    “…Building on these findings, a predictive framework is constructed by integrating machine learning algorithms with advanced optimization and data handling strategies. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Innovation in makeup applicator for hand disability people / Nur Danisha Aleya Nor Azam … [et al.] by Nor Azam, Nur Danisha Aleya, Rozman, Nadhirah Illani, Abd Rahman, Imanina Dahlia, Hamdan, Dayana Nur Hanis, Arifin, Nur Arisha, Harun, Norazman

    Published 2024
    “…Through advanced sensors and computer vision technology, the device adapts to individual needs and preferences over time, enhancing accessibility and inclusivity in beauty practices. While the proposed framework lacks demonstrated results, it holds promise for addressing the unmet needs of individuals with limited hand mobility, urging further research and development efforts in this area.…”
    Get full text
    Get full text
    Get full text
    Book Section