Search Results - (( developing program e algorithm ) OR ( java based verification algorithm ))
Search alternatives:
- verification algorithm »
- developing program »
- based verification »
- e algorithm »
- program e »
- java »
-
1
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
2
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…For this research, several set of robots by using Lego has been developed and it uses LeJos and C programming techniques as a platform. A Java-based robot development tool has been set up as alternative programming methods incorporating LeJos and the controller. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis -
4
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000Get full text
Get full text
Thesis -
6
-
7
-
8
Implementation of color filtering on FPGA
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
9
The development of an automated pattern recognition based on neural network / Irni Hamiza Hamzah, Mohammad Nizam Ibrahim and Linda Mohd Kasim
Published 2006“…The capability of powerful personal computers and affordable and high resolution sensors (i.e.: CCD cameras, microphones and scanners) have fostered the development of pattern recognition algorithms in new application domains (i.e.: fuzzy logic, neural network and genetic algorithm). …”
Get full text
Get full text
Research Reports -
10
-
11
Firefly algorithm for optimal sizing of Standalone Photovoltaic System / Nurizzati Abdul Aziz
Published 2016“…In addition, sizing algorithm with FA was also discovered to outperform sizing algorithm with selected computational intelligence, i.e. …”
Get full text
Get full text
Thesis -
12
Firefly algorithm for optimal sizing of stand-alone photovoltaic system / Nur Izzati Abdul Aziz
Published 2016“…In addition, sizing algorithm with FA was also discovered to outperform sizing algorithm with selected computational intelligence, i.e. …”
Get full text
Get full text
Thesis -
13
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
14
Hybrid scheduling and dual queue scheduling
Published 2009Get full text
Get full text
Conference or Workshop Item -
15
Improving Extreme Programming Framework With Security Concerns For E-Commerce Applications
Published 2024thesis::doctoral thesis -
16
Conference Approval System (e-CoAS) / Nor Hidayah Rahim
Published 2015Get full text
Get full text
Thesis -
17
-
18
Explicit solution of parameter estimate using multiparametric programming for boost converter
Published 2023Get full text
Get full text
Get full text
Conference or Workshop Item -
19
-
20
Web based applications for energy management system incorporated network reconfiguration using genetic algorithm / Wan Adnan Wan
Published 2006“…The Web Application System program is designed for the client to configure a system (e.g calculates a load flow). …”
Get full text
Get full text
Thesis
