Search Results - (( developing practices against algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1
  2. 2

    A new cryptosystem analogous to LUCELG and Cramer-Shoup by Muslim, Norliana, Md. Said, Mohamad Rushdan

    Published 2009
    “…Cramer-Shoup is a practical public key cryptosystem provably secure against adaptive chosen ciphertext attack that requires a universal one-way hash function. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Detection of muscle activities in the sEMG signal by using frequency features and adaptive decision threshold by Hameed, Husamuldeen Khalid, Wan Hasan, Wan Zuha, Shafie, Suhaidi, Ahmad, Siti Anom, Jaafar, Haslina, Inche Mat, Liyana Najwa

    Published 2020
    “…In this paper, an amplitude-independent algorithm had been developed with an adaptive decision threshold; the algorithm employed only frequency features of the sEMG signal to detect muscle activities. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Reconstructing applicable chaotic Baptista-type symmetric cryptosystem by Daud, Muhamad Azlan

    Published 2014
    “…We then designed a new compression algorithm developed using ideas from the Huffman coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Detection of muscle activities in the sEMG signal by using frequency features and adaptive decision threshold by Hameed, Husamuldeen Khalid, Wan Hasan, Wan Zuha, Shafie, Suhaidi, Ahmad, Siti Anom, Jaafar, Haslina, Inche Mat, Liyana Najwa

    Published 2020
    “…In this paper, an amplitude-independent algorithm had been developed with an adaptive decision threshold; the algorithm employed only frequency features of the sEMG signal to detect muscle activities. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Estimation Of Time Of Concentration Using Triangulated Irregular Network Method by Ewe, Teik Tsia

    Published 2015
    “…This method is computer based and thus the algorithm of TIN method was developed. The algorithm of the TIN method is explained in this research. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Fully automated segmentation of the left ventricle in cine cardiac magnetic resonance imaging / Tan Li Kuo by Tan, Li Kuo

    Published 2018
    “…In conclusion, two algorithms were developed and tested leading to fully automatic segmentation of LV in cardiac cine MRI. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Great Deluge and Extended Great Deluge based job scheduling in grid computing using GridSim by Seifaddini, Omid, Abdullah, Azizol, Muhammed, Abdullah, Hussin, Masnida

    Published 2016
    “…Great Deluge (GD) is a practical solution for such a problem. Therefore, this paper presents Great Deluge and Extended Great Deluge (EGD) based scheduling algorithm for Grid computing. …”
    Get full text
    Get full text
    Get full text
    Book Section
  10. 10

    An expert knowledge based decommissioning alternative selection system for fixed oil and gas assets in the South China Sea by Na, K.L., Lee, H.E., Liew, M.S., Wan Abdullah Zawawi, N.A.

    Published 2017
    “…A comprehensive framework is proposed to establish a practical working philosophy for the developed algorithm. © 2016 Elsevier Ltd…”
    Get full text
    Get full text
    Article
  11. 11

    A Framework for Green Energy Resources Identification and Integration Supported by Real-Time Monitoring, Control, and Automation Applications by Far Chen, Jong

    Published 2025
    “…In conclusion, the proposed methodologies demonstrate the potential to overcome barriers to green energy implementation, fostering sustainable development in Sarawak. This research offers practical insights for policymakers, energy stakeholders, and researchers advancing green energy initiatives.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Fully automated segmentation of the left ventricle in cine cardiac MRI using neural network regression by Tan, Li Kuo, McLaughlin, Robert A., Lim, Einly, Abdul Aziz, Yang Faridah, Liew, Yih Miin

    Published 2018
    “…Data Conclusion: A fully automated LV segmentation algorithm was developed and validated against a diverse set of cardiac cine MRI data sourced from multiple imaging centers and scanner types. …”
    Get full text
    Get full text
    Article
  13. 13

    Amplitude independent muscle activity detection algorithm of soft robotic glove system for hemiparesis stroke patients using single sEMG channel by Hameed, Husamuldeen Khalid

    Published 2020
    “…The performance of the proposed algorithm has outperformed that of the amplitude-dependent algorithms regarding the detection of weak muscle activities and robustness against false alarms. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Simulated Kalman Filter algorithms for solving optimization problems by Nor Hidayati, Abdul Aziz

    Published 2019
    “…Its optimality has inspired the development of a metaheuristic algorithm called Heuristic Kalman Algorithm (HKA) in 2009. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Variable Neighborhood Descent and Whale Optimization Algorithm for Examination Timetabling Problems at Universiti Malaysia Sarawak by Emily Sing Kiang, Siew

    Published 2025
    “…The model employs a two-level structure, where the first level uses standard soft constraints as the objective function to evaluate solution quality, while the second level dynamically adapts to faculty-specific preferences. A constructive algorithm was developed to generate an initial feasible solution, which was subsequently refined using two primary approaches to evaluate their efficiency: Iterative Threshold Pipe Variable Neighborhood Descent (IT-PVND), and a modified Whale Optimization Algorithm (WOA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Enhanced multi-objective evolutionary mating algorithm with improved crowding distance and levy flight for optimizing comfort index and energy consumption in smart buildings by Muhammad Naim, Nordin, Mohd Herwan, Sulaiman, Nor Farizan, Zakaria, Zuriani, Mustaffa

    Published 2025
    “…Comparative analysis against established algorithms, like NSGA-II demonstrates MOEMA's effectiveness in achieving superior solution diversity and convergence characteristics. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A novel softsign fractional-order controller optimized by an intelligent nature-inspired algorithm for magnetic levitation control by Ahmad, Mohd Ashraf, Izci, Davut, Ekinci, Serdar, Mohd Tumari, Mohd Zaidi

    Published 2025
    “…The performance of the proposed approach was extensively benchmarked against four modern metaheuristic algorithms (greater cane rat algorithm, catch fish optimization algorithm, RIME algorithm and artificial hummingbird algorithm) under identical conditions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Evolving fuzzy grammar for crime texts categorization by Mohd Sharef, Nurfadhlina, Martin, Trevor

    Published 2015
    “…The performance of EFG in crime texts categorization is evaluated against expert-tagged real incidents summaries and compared against C4.5, support vector machines, naïve Bayes, boosting, and k-nearest neighbour methods. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20