Search Results - (( development using interception algorithm ) OR ( java applications optimization algorithm ))

Refine Results
  1. 1

    Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar by Jaafar, Mohd Izhar

    Published 2012
    “…They need to communicate in secure environment to avoid eavesdropping or interception. The purpose of this study was to design and develop new secure plug-in on Microsoft Outlook using integration of symmetric and asymmetric cryptographic algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  5. 5
  6. 6
  7. 7

    Methods of aircraft trajectory optimisation in air combat by Nusyirwan, Istas Fahrurrazi, Bil, Cees

    Published 2007
    “…An algorithm has been developed and implemented using Evolutionary Programming. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT by Abdullah, Amran

    Published 2006
    “…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Examination timetabling using genetic algorithm case study: KUiTTHO by Mohd Salikon, Mohd Zaki

    Published 2005
    “…Genetic Algorithm (GA) is one of the most popular optimization solutions. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Examination Timetabling Using Genetic Algorithm Case Study : KUiTTHO by Mohd. Zaki, Mohd. Salikon

    Published 2005
    “…Genetic Algorithm (GA) is one of the most popular optimization solutions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Improving Class Timetabling using Genetic Algorithm by Qutishat, Ahmed Mohammed Ali

    Published 2006
    “…We have targeted the research on class timetabling problem. Hence, Genetic Algorithm (GA) is used as one of the most popular optimization solutions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Secured agriculture sensor data based on end-to-end encryption using raspberry pi by Choo, Jia Huey

    Published 2025
    “…However, much of this sensor data is transmitted without encryption, exposing it to risks such as interception, tampering, and unauthorised access. This project addresses these security concerns by developing a secure data collection and visualisation system using Raspberry Pi and Node-RED. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16
  17. 17
  18. 18

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Rekabentuk, Analisis Dan Perlaksanaan Sistem Ka Walan Meriam by Mat Amin, Zainal Abidin

    Published 1999
    “…time taken by a shell and a target to arrive at the same position which is known as point of intercept. The prediction algorithm has been developed using numerical method which tunes the time of flight and gun aiming point to obtain the point of intercept error within an acceptable maximum value or predetermined tuning iteration. …”
    Get full text
    Get full text
    Thesis
  20. 20