Search Results - (( development using interception algorithm ) OR ( java application reoptimize algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1

    Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar by Jaafar, Mohd Izhar

    Published 2012
    “…They need to communicate in secure environment to avoid eavesdropping or interception. The purpose of this study was to design and develop new secure plug-in on Microsoft Outlook using integration of symmetric and asymmetric cryptographic algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Methods of aircraft trajectory optimisation in air combat by Nusyirwan, Istas Fahrurrazi, Bil, Cees

    Published 2007
    “…An algorithm has been developed and implemented using Evolutionary Programming. …”
    Get full text
    Get full text
    Article
  3. 3

    Secured agriculture sensor data based on end-to-end encryption using raspberry pi by Choo, Jia Huey

    Published 2025
    “…However, much of this sensor data is transmitted without encryption, exposing it to risks such as interception, tampering, and unauthorised access. This project addresses these security concerns by developing a secure data collection and visualisation system using Raspberry Pi and Node-RED. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    Rekabentuk, Analisis Dan Perlaksanaan Sistem Ka Walan Meriam by Mat Amin, Zainal Abidin

    Published 1999
    “…time taken by a shell and a target to arrive at the same position which is known as point of intercept. The prediction algorithm has been developed using numerical method which tunes the time of flight and gun aiming point to obtain the point of intercept error within an acceptable maximum value or predetermined tuning iteration. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Optimal Real Time Evasion against High Speed Pursuer Using Evolutionary Programming by Nusyirwan, Istas F., Bil, Cees

    Published 2006
    “…The pursuer simply home-in to the evader and the evader follows the trajectory suggested from the algorithm. In both scenarios, the evader is able to steer itself from interception.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8
  9. 9

    Detection of butter adulteration with lard by employing 1H-NMR spectroscopy and multivariate data analysis by Ahmad Fadzlillah, Nurrulhidayah, Che Man, Yaakob, Abdul Rohman, Ismail, Amin, Mustafa, Shuhaimi, Rosman, Arieff Salleh, Khatib, Alfi

    Published 2014
    “…Since the spectra obtained were too complex to be analyzed visually by the naked eyes, the classification of spectra was carried out using multivariate data analysis. The spectroscopic data of butter adulterated with lard samples were chemometrically evaluated and calibrated using the partial least square (PLS) algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Consumers' intention to use e-money mobile using the decomposed theory of planned behavior by Husnil, Khatimah

    Published 2016
    “…The Partial Least Squares Method (PLS) series PLS 2.0 M3 for algorithm and bootstrap techniques and SPSS 18 was used to test the hypothesis that has been developed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    An experiment of scalable video security solution using H.264/AVC and advanced encryption standard (AES): Selective cryptography by Abomhara, Mohamed, Khalifa, Othman Omran, Zaidan , A. A., Zaidan , B. B., Zakaria, Omar, Gani, Abdullah

    Published 2011
    “…For video, the method has been adopted to protect unwanted interception and viewing of any video while in transmission over the networks. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    An experiment of scalable video security solution using H. 264/AVC and advanced encryption standard (AES): selective cryptography by Abomhara, Mohamed, Khalifa, Othman O., Zaidan, A.A., Zaidan, B.B., Zakaria, Omar, Gani, Abdullah

    Published 2011
    “…For video, the method has been adopted to protect unwanted interception and viewing of any video while in transmission over the networks. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    FT-IR- based metabolomics approach to characterize the α-glucosidase inhibitory activity of Salak fruit by Saleh, Mohammed S M, Siddiqui, Mohammad Jamshed Ahmad, Mat So'ad, Siti Zaiton, Khatib, Alfi

    Published 2017
    “…Multivariate analysis with combination of orthogonal partial least-squares (OPLS) algorithm was used to correlate the α-glucosidase inhibitory activity of the samples with the infrared spectral data. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    A classifier mechanism for host based intrusion detection and prevention system in cloud computing environment by Al-Zarqawee, Aws Naser

    Published 2018
    “…To implement the proposed mechanism, we demonstrate the strength of the classifier using a dimensionally reduced dataset using NSL-KDD. …”
    Get full text
    Get full text
    Thesis