Search Results - (( development a interception algorithm ) OR ( java application optimisation algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar by Jaafar, Mohd Izhar

    Published 2012
    “…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
    Get full text
    Get full text
    Thesis
  3. 3

    An efficient likelihood-based modulation classification algorithm for multiple-input multiple-output systems by Bahloul, M.R., Yusoff, M.Z., Abdel-Aty, A.-H., Saad, M.N.M.

    Published 2016
    “…To overcome the problems associated with the existing likelihood-based MC algorithms, a new algorithm is developed in this paper. …”
    Get full text
    Get full text
    Article
  4. 4

    Methods of aircraft trajectory optimisation in air combat by Nusyirwan, Istas Fahrurrazi, Bil, Cees

    Published 2007
    “…An algorithm has been developed and implemented using Evolutionary Programming. …”
    Get full text
    Get full text
    Article
  5. 5

    Development of algorithm for single axis sun tracking system by Yi, L.Z., Singh, B.S.M., Ching, D.L.C., Jin, C.L.E.

    Published 2016
    “…The output power from a solar panel depends on the amount of sunlight that is intercepted by the photovoltaic (PV) solar panel. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  7. 7

    Rekabentuk, Analisis Dan Perlaksanaan Sistem Ka Walan Meriam by Mat Amin, Zainal Abidin

    Published 1999
    “…The prediction algorithm has been developed using numerical method which tunes the time of flight and gun aiming point to obtain the point of intercept error within an acceptable maximum value or predetermined tuning iteration. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Secured agriculture sensor data based on end-to-end encryption using raspberry pi by Choo, Jia Huey

    Published 2025
    “…Additionally, a benchmarking tool was developed to evaluate and compare the performance of these algorithms in terms of speed, memory, CPU usage, and encryption overhead. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Security enhancement of digital motion image transmission using hybrid AES-DES algorithm by Vishnu M.B., Tiong S.K., Zaini M., Koh S.P.

    Published 2023
    “…This paper presents the design and implementation of a symmetrical hybrid based 128 bit key AES-DES algorithm as a security enhancement for live motion image transmission. …”
    Conference paper
  10. 10

    Optimal Real Time Evasion against High Speed Pursuer Using Evolutionary Programming by Nusyirwan, Istas F., Bil, Cees

    Published 2006
    “…An evolutionary technique has been developed to search for an optimal trajectory for an evader against a very agile and fast pursuer. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12
  13. 13

    Detection of butter adulteration with lard by employing 1H-NMR spectroscopy and multivariate data analysis by Ahmad Fadzlillah, Nurrulhidayah, Che Man, Yaakob, Abdul Rohman, Ismail, Amin, Mustafa, Shuhaimi, Rosman, Arieff Salleh, Khatib, Alfi

    Published 2014
    “…The spectroscopic data of butter adulterated with lard samples were chemometrically evaluated and calibrated using the partial least square (PLS) algorithm. The multivariate calibration of PLS model for the prediction of adulterant was developed for quantitative measurement. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Consumers' intention to use e-money mobile using the decomposed theory of planned behavior by Husnil, Khatimah

    Published 2016
    “…The Partial Least Squares Method (PLS) series PLS 2.0 M3 for algorithm and bootstrap techniques and SPSS 18 was used to test the hypothesis that has been developed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    FT-IR- based metabolomics approach to characterize the α-glucosidase inhibitory activity of Salak fruit by Saleh, Mohammed S M, Siddiqui, Mohammad Jamshed Ahmad, Mat So'ad, Siti Zaiton, Khatib, Alfi

    Published 2017
    “…The OPLS biplot model identified several functional groups (C=O, O-H C-O, C-N, C-H and C=C) strongly induced α-glucosidase inhibitory activity. A successful the model was validated by comparing the model intercept values with original values.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  18. 18

    A classifier mechanism for host based intrusion detection and prevention system in cloud computing environment by Al-Zarqawee, Aws Naser

    Published 2018
    “…In this thesis, a new mechanism for an H-IDPS classifier in a cloud environment has desigend. …”
    Get full text
    Get full text
    Thesis