Search Results - (( java _ visualization algorithm ) OR ( based coding optimisation algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Evolutionary algorithm based network coding for optmization of intelligent vehicular ad hoc network by Lee, Chun Hoe

    Published 2017
    “…This project aims to improve the throughput, energy consumption and overhead of vehicular ad hoc network (VANET) by optimising the network coding (NC) using Genetic Algorithm and Particle Swarm Optimisation (GA-PSO). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Evolutionary algorithm based network coding for optimization of intelligent vehicular ad hoc network by Lee, Chun Hoe

    Published 2017
    “…This project aims to improve the throughput, energy consumption and overhead of vehicular ad hoe network (VANET) by optimising the network coding (NC) using Genetic Algorithm and Particle Swarm Optimisation (GA-PSO). …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Optimal water supply reservoir operation by leveraging the meta-heuristic Harris Hawks algorithms and opposite based learning technique by Lai V., Huang Y.F., Koo C.H., Ahmed A.N., Sherif M., El-Shafie A.

    Published 2024
    “…In this study, an attempt via metaheuristic algorithms, namely the Harris Hawks Optimisation (HHO) Algorithm and the Opposite Based Learning of HHO (OBL-HHO) are made to minimise the water deficit as well as mitigate floods at downstream of the Klang Gate Dam (KGD). …”
    Article
  6. 6

    A performance analysis of association rule mining algorithms by Fageeri, S.O., Ahmad, R., Alhussian, H.

    Published 2016
    “…The results of the CPU profiler of Java VisualVM showed that Binary-Based algorithm performs better than Eclat algorithm in-terms of both execution times and memory usage. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9
  10. 10

    Development of a scalable video compression algorithm by Khalifa, Othman Omran, Issa, Sinzobakwira, Olanweraju, Rashidah Funke, Al Khazmi, El Mahdi A

    Published 2012
    “…The result shows that the managed complexity algorithm based on Lagrangian Multiplier function outperforms the normal encoder. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    A genetic algorithm for management of coding resources in VANET by Lee, Chun Hoe, Lim, Kit Guan, Min Keng Tan, Renee Ka Yin Chin, Kenneth Tze Kin Teo

    Published 2017
    “…This project aims to improve the throughput, energy consumption and overhead of vehicular ad hoc network (VANET) by optimising the network coding (NC) using Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Artificial immune network model based controller for vibration suppression of flexible structures by Md. Salleh, Salihatun, Tokhi, M. Osman, Toha, Siti Fauziah

    Published 2010
    “…The AiNet model based controller thus developed shows the capability of the approach with relatively better accuracy in comparison to using real-coded genetic algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13
  14. 14

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Visdom: Smart guide robot for visually impaired people by Lee, Zhen Ting

    Published 2025
    “…An Android mobile application, developed using Java and the java.net.Socket library, provides an intuitive and accessible user interface for seamless interaction with the robot. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17
  18. 18

    Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah by Abdullah, Muhammad Arif Musa

    Published 2023
    “…The study recommends to use another type of digital signature algorithm to be used in the proposed method. Another recommendation is to modify and optimise the python coding in the study to be more robust and suitable for real world application.…”
    Get full text
    Get full text
    Student Project
  19. 19
  20. 20

    Active intelligent control of vibration of flexible plate structures by Md Salleh, Salihatun

    Published 2011
    “…In this work active intelligent control comprises a set of control techniques based on particle swarm optimisation (PSO), real coded genetic algorithm (RCGA) and artificial immune system (AIS). …”
    Get full text
    Get full text
    Thesis