Search Results - (( development a interception algorithm ) OR ( java adaptation optimization algorithm ))
Search alternatives:
- adaptation optimization »
- interception algorithm »
- java adaptation »
- a interception »
- development a »
-
1
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
2
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
Get full text
Get full text
Thesis -
3
An efficient likelihood-based modulation classification algorithm for multiple-input multiple-output systems
Published 2016“…To overcome the problems associated with the existing likelihood-based MC algorithms, a new algorithm is developed in this paper. …”
Get full text
Get full text
Article -
4
Methods of aircraft trajectory optimisation in air combat
Published 2007“…An algorithm has been developed and implemented using Evolutionary Programming. …”
Get full text
Get full text
Article -
5
Development of algorithm for single axis sun tracking system
Published 2016“…The output power from a solar panel depends on the amount of sunlight that is intercepted by the photovoltaic (PV) solar panel. …”
Get full text
Get full text
Conference or Workshop Item -
6
Rekabentuk, Analisis Dan Perlaksanaan Sistem Ka Walan Meriam
Published 1999“…The prediction algorithm has been developed using numerical method which tunes the time of flight and gun aiming point to obtain the point of intercept error within an acceptable maximum value or predetermined tuning iteration. …”
Get full text
Get full text
Thesis -
7
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025“…Additionally, a benchmarking tool was developed to evaluate and compare the performance of these algorithms in terms of speed, memory, CPU usage, and encryption overhead. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Security enhancement of digital motion image transmission using hybrid AES-DES algorithm
Published 2023“…This paper presents the design and implementation of a symmetrical hybrid based 128 bit key AES-DES algorithm as a security enhancement for live motion image transmission. …”
Conference paper -
9
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Optimal Real Time Evasion against High Speed Pursuer Using Evolutionary Programming
Published 2006“…An evolutionary technique has been developed to search for an optimal trajectory for an evader against a very agile and fast pursuer. …”
Get full text
Get full text
Conference or Workshop Item -
11
Performance monitoring algorithm for optimizing electrical power generated by using photovoltaic system
Published 2016Get full text
Get full text
Conference or Workshop Item -
12
An Improved Rectangle Lightweight Block Cipher Based On 3d Rotation Method
Published 2024thesis::doctoral thesis -
13
Detection of butter adulteration with lard by employing 1H-NMR spectroscopy and multivariate data analysis
Published 2014“…The spectroscopic data of butter adulterated with lard samples were chemometrically evaluated and calibrated using the partial least square (PLS) algorithm. The multivariate calibration of PLS model for the prediction of adulterant was developed for quantitative measurement. …”
Get full text
Get full text
Conference or Workshop Item -
14
An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography
Published 2011“…آ©2011 Academic Journals.…”
Get full text
Get full text
Get full text
Article -
15
Consumers' intention to use e-money mobile using the decomposed theory of planned behavior
Published 2016“…The Partial Least Squares Method (PLS) series PLS 2.0 M3 for algorithm and bootstrap techniques and SPSS 18 was used to test the hypothesis that has been developed. …”
Get full text
Get full text
Get full text
Thesis -
16
An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography
Published 2011“…In this paper, we design a new selective video encryption based on H.264/AVC and AES. …”
Get full text
Get full text
Get full text
Article -
17
FT-IR- based metabolomics approach to characterize the α-glucosidase inhibitory activity of Salak fruit
Published 2017“…The OPLS biplot model identified several functional groups (C=O, O-H C-O, C-N, C-H and C=C) strongly induced α-glucosidase inhibitory activity. A successful the model was validated by comparing the model intercept values with original values.…”
Get full text
Get full text
Get full text
Proceeding Paper -
18
A classifier mechanism for host based intrusion detection and prevention system in cloud computing environment
Published 2018“…In this thesis, a new mechanism for an H-IDPS classifier in a cloud environment has desigend. …”
Get full text
Get full text
Thesis
