Search Results - (( gate operational data algorithm ) OR ( java application using algorithm ))
Search alternatives:
- gate operational »
- operational data »
- java application »
- using algorithm »
- data algorithm »
-
1
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
PREDICTIVE ANALYTICS FOR EQUIPMENT FAILURE BY USING GATED RECURRENT UNIT – GENETIC ALGORITHM (GRU – GA)
Published 2023“…In this case, Deep Learning (DL) is chosen to construct the prediction activity for estimating the life expectancy of an equipment. Gated Recurrent Unit (GRU) algorithm is used to cater the predicting action of equipment state based on data from an oil and gas industry.…”
Get full text
Get full text
Thesis -
3
Design and implementation of real data fast fourier transform processor on field programmable gates array
Published 2015“…In this work, the memorybased FFT processor, based on radix-4 FFT algorithm is implemented on Cyclone II Field Programmable Gates Array (FPGA). …”
Get full text
Get full text
Thesis -
4
Application of the Whale Optimization Algorithm (WOA) in Reservoir Optimization Operation Under Investigation of Climate Change Impact: A Case Study at Klang Gate Dam, Malaysia
Published 2024“…The effectiveness of analyzing large amounts of data that comes with engaging climate change scenarios, for planning advanced reservoir management can be achieved through the use of optimization algorithms. …”
Conference Paper -
5
-
6
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
7
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…To fully utilize the performance potential of XTS mode of operation, a parallel design for the algorithm is proposed. …”
Get full text
Get full text
Thesis -
8
-
9
Predicting machine failure using recurrent neural network-gated recurrent unit (RNN-GRU) through time series data
Published 2021“…It helps those sectors such as production to foresee the state of machine in line with saving the cost from sudden breakdown as unplanned machine failure can disrupt the operation and loss up to millions. Thus, this paper offers a deep learning algorithm named recurrent neural network-gated recurrent unit (RNN-GRU) to forecast the state of machines producing the time series data in an oil and gas sector. …”
Get full text
Get full text
Article -
10
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
11
Design of an advanced encryption standard crypto-processor core for field programmable gate array implementation
Published 2006“…The proposed AES Crypto-Processor accelerates the AES algorithm in reconfigurable Field Programmable Gate Arrays (FPGA). …”
Get full text
Get full text
Thesis -
12
Optimization of reservoir operation at Klang Gate Dam utilizing a whale optimization algorithm and a L�vy flight and distribution enhancement technique
Published 2023“…Taking it further, the KGD was studied using the nature-inspired meta-heuristic algorithms (MHAs). The Whale Optimisation Algorithm (WOA) solves complex technical issues. …”
Article -
13
Meta-heuristic approaches for reservoir optimisation operation and investigation of climate change impact at Klang gate dam
Published 2023“…Consequently, seeking managing of reservoir optimisation operations had always been at the forefront and to improve managing, algorithms have had been presented over the past few decades, beginning with conventional algorithms, followed by heuristic algorithms, and finally, the meta-heuristic algorithms (MHAs). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
Published 2000“…All input output data interface and internal operations are performed in 32-bit width. …”
Get full text
Get full text
Conference or Workshop Item -
15
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…The hardware based of encryption chip become realizable with Field Programmable Gate Arrays (FPGAs). There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
Get full text
Get full text
Monograph -
16
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
18
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Improved genetic algorithm for direct current motor high speed controller implemented on field programmable gate array
Published 2019“…Firstly, to propose an accurate TF for the tested DC motors by designing High Speed Motor Data Acquisition System (HSMDAQS) to collect data in data to be imported into System Identification (Sys Ident). …”
Get full text
Get full text
Thesis -
20
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item
