Search Results - (( development technology exploitation algorithm ) OR ( java data function algorithm ))

Refine Results
  1. 1

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Prototypes, simulations, observations and interviews were used as the data gathering methods. An offline FOA Java simulation was carried out to evaluate the capability of the MRA method in preventing FOA attack. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3
  4. 4
  5. 5
  6. 6

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11

    Complex-valued nonlinear adaptive filters for noncircular signals by Cyprian, Amadi Chukwuemena

    Published 2017
    “…Their importance in real-world application is showed through case studies. The CC-CNGD algorithm rigorously takes advantage of the fast convergence rate of the CNGD algorithm and as well exploit the low Means Square Error (MSE) of the ACNGD algorithm in order to circumvent the problem of slow convergence rate and high Mean Square Error (MSE) seen in the family of complex signal. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Swarm intelligence optimization algorithms: a review by Odili, Julius Beneoluchi, M. N. M., Kahar, Noraziah, Ahmad

    Published 2018
    “…As a result, researchers that believe that mimicking nature is key to solving diverse problems in engineering, technology and science has developed a number of swarm intelligence techniques. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    Non pilot and pilot aided least square channel estimation algorithm in MIMO-OFDM system / Nursarah Ainaa Abdul Halim by Abdul Halim, Nursarah Ainaa

    Published 2013
    “…Wireless communication is a developed technology and had been widely used nowadays, so the developments in digital communication are rapidly increasing to meet the ever increasing demand of higher data rates. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Utilising MIMO for Location and Positioning in IMT -Advanced Systems by Awang Md Isa, Azmi

    Published 2010
    “…With the advances of multiple input multiple output (MIMO) technology as one of IMT-Advanced features, it has hecome feasible to adopt the technology into the mobile location scenario. …”
    Get full text
    Get full text
    Conference or Workshop Item