Search Results - (( development process function algorithm ) OR ( java communication can algorithm ))

Refine Results
  1. 1

    Network monopoly / Tan Kean Yeap by Tan , Kean Yeap

    Published 2002
    “…Moreover, because of the expanding memory anda processing power of these computers, users can put the machine to work on new kinds of applications and functions. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Mobile application for real time baby sign language recognition using YOLOv8 / Siti Aishah Idris and Ahmad Firdaus Ahmad Fadzil by Idris, Siti Aishah, Ahmad Fadzil, Ahmad Firdaus

    Published 2024
    “…In the development phase, the dataset is pre-processed before the modeling process is done using YOLOv8, and deployed on Android platforms using Java and Kotlin languages in Android Studio. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4
  5. 5

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…SANAsms is capable to send confidential encrypted information in SMS via normal GSM and it only can be read by person who can decrypt it. Currently, normal SMS using GSM communication is not secured and safe enough. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Text messaging encryption system by Sundara Morthty, Nirmala Devi

    Published 2012
    “…At present, banking,commerce and passwords can only be communicated with internet connection or as in person verbally or in written;Text Messaging Encryption system needs to overcome this intermediate subjects and deliver instructions or messages instantaneously and securely. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7
  8. 8
  9. 9

    Effort Estimation Model for Function Point Measurement by Koh, Tieng Wei

    Published 2007
    “…Various cost estimation models and methods are available to be used for software development process. The COCOMO, an algorithmic model is one example. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Development Of Generative Computer-Aided Process Planning System For Lathe Machining by Zubair, Ahmad Faiz

    Published 2019
    “…CAPP functions as the recognizer of the geometric input from CAD and analyse it into specific function for manufacturing purpose in CAM. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A Reference Based Surface Defect Segmentation Algorithm For Automatic Optical Inspection System by Wong, Ze-Hao

    Published 2020
    “…This study aims to develop an algorithm for the AOI system to segment and detect surface defects, requiring low processing power and a small number of learning dataset with labelling error resistance. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…Political analysts often communicate with the public and exchange information through the social media platform. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Computer control of batch process plant (software development) by Safian, Salehudin

    Published 1995
    “…The algorithm has been successful tested using the Non-interacting Liquid Level Control of Three lank System plant models transfer function.…”
    Get full text
    Get full text
    Student Project
  14. 14

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…The structure of the components has a fixed block size which is 128 bits and a key size of 128 bits. There are three functions for each encryption process which are substitution function, crossover and mutation function and add round key function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Computing the autopilot control algorithm using predictive functional control for unstable model by H. A., Kasdirin, J. A., Rossiter

    Published 2009
    “…This paper discusses the computing development of a control algorithm using Predictive Functional Control (PFC) for model-based that having one or more unstable poles. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Hybrid artificial immune system-genetic algorithm optimization based on mathematical test functions by Ali M.O., Koh S.P., Chong K.H., Yap D.F.W.

    Published 2023
    “…The hybrid includes two processes; firstly, AIS is the attraction among the researchers as the algorithm. …”
    Conference paper
  17. 17

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The provider, which is an open source library, is used to provide the secure communication channel. The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    Mathematical modelling of mass transfer in a multi-stage rotating disc contactor column by Maan, Normah

    Published 2005
    “…A series of algorithms in solving the inverse problem were then developed corresponding to the forward models. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A refined differential evolution algorithm for improving the performance of optimization process by A. R., Yusoff, Nafrizuan, Mat Yahya

    Published 2011
    “…Among the latest Evaluation Algorithm (EA) have been developed is Differential Evolution (DE). …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item