Search Results - (( development programmes among algorithm ) OR ( java implication _ algorithm ))
Search alternatives:
- development programmes »
- programmes among »
- java implication »
- among algorithm »
-
1
Prioritisation Assessment and Robust Predictive System for Medical Equipment: A Comprehensive Strategic Maintenance Management
Published 2024journal::journal article -
2
Computerised Heuristic Algorithm for Multi-location Lecture Timetabling
Published 2020“…A two-stage heuristic algorithm is proposed to solve the multi-location timetabling problem on MSc HRD coursework programme. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…In addition, the parallel XTS mode was also simulated using Twofish and RC6 encryption algorithms. Detailed comparison between Twofish and RC6 algorithms has been made with respect to AES algorithm.…”
Get full text
Get full text
Thesis -
5
Implementation of Hybrid Indexing, Clustering and Classification Methods to Enhance Rural Development Programme in South Sulawesi
Published 2024“…The village assistance programme can motivate and engage rural communities during the participatory and transparent phase of village development. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Article -
7
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
9
An Efficient Energy Aware Adaptive System-On-Chip Architecture For Real-Time Video Analytics
Published 2016“…A Performance model for Zynq is developed using analytical method and used in hardware/software codesign to facilitate algorithms mapping to hardware. …”
Get full text
Get full text
Thesis -
10
Using genetic algorithms to optimise land use suitability
Published 2012“…In this study, under environmentfriendliness objective, based on multi-agent genetic algorithms, was developed a geospatial model for the land use allocation. …”
Get full text
Get full text
Thesis -
11
Smart final year project archive system using laravel framework with email notification (SFYPAS) / Abidah Mat Taib
Published 2020“…SFYPAS is developed using Laravel framework and the methodology used throughout the project is using Software Development Life Cycle (SDLC). …”
Get full text
Get full text
Get full text
Article -
12
SDN-based VANET routing: A comprehensive survey on architectures, protocols, analysis, and future challenges
Published 2024“…Generally, such services are realized through data sharing among vehicles and nearby infrastructures or vehicles over multi-hop data routing mechanisms. …”
Get full text
Get full text
Get full text
Article -
13
Optimal load management strategy for enhanced time of use (ETOU) electricity tariff in Peninsular Malaysia / Mohamad Fani Sulaima
Published 2020“…Self-organizing mapping algorithm was integrated with the PSO, EPSO, and ACO algorithms to classify and select the best load management (LM) strategies. …”
Get full text
Get full text
Thesis -
14
The prevalence and functional impact of rare genomic copy number variation in hypertension-related left ventricular hypertrophy / Julia Ashazila Mat Jusoh
Published 2020“…Copy number variation (CNV) may contribute to the development of HT LVH+. Three hundred hypertensive participants among whom 100 had LVH, underwent genome-wide genotyping of copy number variation using microarray. …”
Get full text
Get full text
Thesis -
15
SDN-Based VANET Routing: A Comprehensive Survey on Architectures, Protocols, Analysis, and Future Challenges
Published 2025“…Generally, such services are realized through data sharing among vehicles and nearby infrastructures or vehicles over multi-hop data routing mechanisms. …”
Article -
16
Population genetic structure of Malayan Tapir (Tapirus indicus Desmarest) in Peninsular Malaysia
Published 2019“…Using K-means clustering algorithm, five clusters were inferred among the wild samples (N = 57), which showed a complex population structure probably comprising multiple continuous populations that also experiencing considerably restricted gene flow due to isolation by geographical barriers especially mountain ranges. …”
Get full text
Get full text
Thesis -
17
-
18
Vector evaluated particle swarm optimization approach to solve assembly sequence planning problem
Published 2022“…Generation and evaluation of assembly plans, when the number of parts is large their planer is slow [9]. Genetic Algorithm (GA), where the genes in chromosomes represents the components of the product [10, 11]. …”
Get full text
Get full text
Article -
19
Effects of Ambient Tropospheric Ozone on Mr-219 Rice in the Muda Irrigation Scheme Area
Published 2005“…As in many other developing countries in Asia, food security has been an integral national policy objective in Malaysia's development pursuits since the 1950s. …”
Get full text
Get full text
Thesis
