Search Results - (( developing step connection algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks by Alhalabi, Huda A. H.

    Published 2019
    “…The first step of the proposed protocol involves the development of an energy efficient clustering algorithm which is appropriate for WSN with a sparse density topology. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. The proposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Optimal source substation location selection in radial distribution networks by Islam, Shah Jahirul, Mustafa, Mohd. Wazir, Ismail, Hasan

    Published 2004
    “…New computer algorithm has been developed to select the optimal location of source substation in radial distribution networks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…The main steps in this algorithm started with reading the plain text "Original Message" from the user. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Analysis of hyperspectral reflectance for disease classification of soybean frogeye leaf spot using Knime analytics by Ang, Yuhao, Mohd Shafri, Helmi Zulhaidi

    Published 2023
    “…Preprocessing ML steps including converting class numbers to strings, identifying and removing missing values, partitioning and normalizing data were implemented prior to the development of the model. …”
    Get full text
    Get full text
    Article
  6. 6

    Implementation of a modified incremental conductance MPPT algorithm with direct control based on a fuzzy duty cycle change estimator using dSPACE by Radjai, T., Rahmani, L., Mekhilef, Saad, Gaubert, J.P.

    Published 2014
    “…To eliminate all of the disadvantages of the classic IC algorithm, we developed a new IC controller based on a fuzzy duty cycle change estimator with direct control. …”
    Get full text
    Article
  7. 7

    Experimental verification of P&O MPPT algorithm with direct control based on Fuzzy logic control using CUK converter by Radjai, T., Gaubert, J.P., Rahmani, L., Mekhilef, Saad

    Published 2015
    “…The proposed and classical methods are developed and tested successfully using a CUKDC-DC converter, which is connected to a SunTech STP085B model. …”
    Get full text
    Get full text
    Article
  8. 8

    Implication of image processing algorithm in remote sensing and GIS applications by Pathan, Mubeena, Jusoff, Kamaruzaman, Mohd Sood, Alias, Razali, Yaakob, Qureshi, Barkatullah

    Published 2011
    “…Greedy algorithms expresses as a simple solution algorithm that choose a local optimum solution at each step to achieve a global optimum. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Development an accurate and stable range-free localization scheme for anisotropic wireless sensor networks by Han, Fengrong

    Published 2022
    “…This study developed an optimized variation of the DV-Hop localization algorithm for anisotropic wireless sensor networks. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Arduino solar tracker with blynk / Muhammad Azim Hafizi Azlan by Azlan, Muhammad Azim Hafizi

    Published 2024
    “…Beyond technological developments, this project represents an important step toward the general acceptance of renewable energy practices. …”
    Get full text
    Get full text
    Student Project
  12. 12

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Normalized Relational Storage for Extensible Markup Language (XML) Schema by Kamsuriah, Ahmad, Reduan, Samad

    Published 2011
    “…Conclusion/Recommendations: Being able to infer XML functional dependencies constraints to relational views of XML data is a first step towards establishing a connection between XML and its relational representation at the semantic level.…”
    Get full text
    Get full text
    Journal
  14. 14

    Hybrid honey badger algorithm with artificial neural network (HBA-ANN) for website phishing detection by Muhammad Arif, Mohamad, Muhammad Aliif, Ahmad, Zuriani, Mustaffa

    Published 2024
    “…There are multiple techniques in training the network, one of which is training with metaheuristic algorithms. Metaheuristic algorithms that aim to develop more effective hybrid algorithms by combining the good and successful aspects of more than one algorithm are algorithms inspired by nature. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Optimum design of sofc based polygeneration system for residential area with vehicle charging or fueling station / Farah Ramadhani by Farah , Ramadhani

    Published 2019
    “…The last step was to develop the optimum size for the system component by using evolutionary and swarm based optimization algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Development of elasto-plastic viscous damper finite element model for reinforced concrete frames by Hejazi, Farzad, Zabihi, Alireza, Jaafar, Mohd Saleh

    Published 2014
    “…The finite element model consists of reinforced concrete frame element and viscous damper element is developed and special finite element algorithm using Newmark׳s direct step-by-step integration is developed for inelastic dynamic analysis of structure with supplementary elasto-plastic viscous damper element. …”
    Get full text
    Get full text
    Article
  17. 17

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…This thesis steps towards developing a networked game, Literati game system that supporting two players at one time. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Automatic localization of the left ventricular blood pool centroid in short axis cardiac cine MR images by Tan, Li Kuo, Liew, Yih Miin, Lim, Einly, Abdul Aziz, Yang Faridah, Chee, Kok Han, McLaughlin, Robert A.

    Published 2018
    “…In this paper, we develop and validate an open source, fully automatic algorithm to localize the left ventricular (LV) blood pool centroid in short axis cardiac cine MR images, enabling follow-on automated LV segmentation algorithms. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Mapping of Individual Oil Palm Trees Using Airborne Hyperspectral Sensing: An Overview by Jusoff, Kamaruzaman, Pathan, Mubeena

    Published 2009
    “…This overview represents a preamble step for developing an approach for mapping individual oil palm trees from airborne hyperspectral imaging. …”
    Get full text
    Get full text
    Get full text
    Article