Search Results - (( java adaptation optimization algorithm ) OR ( between integrated process algorithm ))

Refine Results
  1. 1
  2. 2

    Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar by Jaafar, Mohd Izhar

    Published 2012
    “…It have increase complexity of process encryption and decryption. New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Collaboration of integrative processes intermediaries supporting supply chain management by Mohd Tamrin, Mohd Izzuddin, Sembok, Tengku Mohd

    Published 2012
    “…The algorithms are an intermediary processes to provide semi automated assistance to the management team for tighter supply chain integration. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  5. 5

    Integration Of Unsupervised Clustering Algorithm And Supervised Classifier For Pattern Recognition by Leong, Shi Xiang

    Published 2017
    “…To solve the problems mentioned, integration of unsupervised clustering algorithm and the supervised classifier is proposed. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Performance comparison analysis of aes-256 sha-256-hmac, aes-256 md5-hmac, 3des sha-256-hmac and 3des-md5-hmac on ipsec vpn using gns3 / Mohd Hilman Lukman by Lukman, Mohd Hilman

    Published 2016
    “…This paper presented performance comparison analysis between two encryption algorithms and two integrity algorithms. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Feature selection with integrated Gaussian seahorse optimization data mining for cross-border business cooperation between the Malaysian medical industry and tourism industry by Ma, Yuaner, Jabar, Juhaini, Abdul Aziz, Nor Azah

    Published 2023
    “…The integrated GSH-DM approach showcases the potential of combining feature selection techniques with advanced optimization algorithms in data mining applications. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    A DC motor controller using PID algorithm implementation on PIC by Wan Robaah, W Ahmad

    Published 2008
    “…PID attempts to correct the error between a measured process variable and a desired setpoint by calculating and then outputting a corrective action that can adjust the process accordingly. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10
  11. 11

    Neural Network with Genetic Algorithm Prediction Model of Energy Consumption for Billing Integrity in Gas Pipeline by Hasbullah, Aidil Fazlina Binti

    Published 2012
    “…Along the development of oil and gas industry, missing data is one of the contributors that restrains in analyzing and processing data task in database. By monitoring and maintaining using metering system, the reliability and billing integrity can be ensured and trustworthy can be developed between distributors and customers. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Fog-cloud scheduling simulator for reinforcement learning algorithms by Al-Hashimi, Mustafa Ahmed Adnan, Rahiman, Amir Rizaan, Muhammed, Abdullah, Hamid, Nor Asilah Wati

    Published 2023
    “…Therefore, supplying optimized scheduling algorithms to provide satisfactory quality service for the node’s task execution and processing becomes demanding. …”
    Get full text
    Get full text
    Article
  13. 13

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16
  17. 17

    Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase by Alaidaros, Hashem Mohammed, A. Rasid, Mohd Fadlee, Othman, Mohamed, Raja Abdullah, Raja Syamsul Azmir

    Published 2007
    “…Despite a number of secure algorithms that have been proposed, the trade-offs made between security and performance demands further research toward improvement. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Improving security performance with parallel crypto operations in SSL bulk data transfer by Alaidaros, Hashem Mohammed, Othman, Mohamed, A. Rasid, Mohd Fadlee

    Published 2009
    “…Despite a number of secure algorithms that have been proposed, the trade-offs made between security and performance demands further research toward improvement. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Bio-inspired fault tolerant network on chip by Sethi, M.A.J., Hussin, F.A., Hamid, N.H.

    Published 2017
    “…The integration of heterogeneous processing elements (PEs) or nodes in the System on Chip (SoC) has made the communication structure very complex. …”
    Get full text
    Get full text
    Article
  20. 20

    Optimum Material Removal in Electrical Discharge Machining through Advanced Control Integration of PSoC Microcontroller by Matthias Tiong Foh Thye, Leong Kah Meng, Mohd Azahar Che Abdullah, Jaysuman Pusppanathan, Abd Rahim Mat Sidek, Bentantya Nugroho

    Published 2025
    “…The pulse generator algorithm was developed to effi ciently manage Ton and Toff , while the Proportional Integral Derivative (PID) algorithm was employed to uphold the gap between the electrode and the workpiece. …”
    Get full text
    Get full text
    Get full text
    Article