Search Results - (( java application based algorithm ) OR ( gate operation data algorithm ))
Search alternatives:
- application based »
- java application »
- gate operation »
- operation data »
- data algorithm »
-
1
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The project's expected outcome is a GPS-Based Physical Identity and Access Management System with the selected lightweight geo-encryption algorithm that can be used to support the control access and management operations of UMS security division.…”
Get full text
Get full text
Get full text
Academic Exercise -
2
PREDICTIVE ANALYTICS FOR EQUIPMENT FAILURE BY USING GATED RECURRENT UNIT – GENETIC ALGORITHM (GRU – GA)
Published 2023“…In this case, Deep Learning (DL) is chosen to construct the prediction activity for estimating the life expectancy of an equipment. Gated Recurrent Unit (GRU) algorithm is used to cater the predicting action of equipment state based on data from an oil and gas industry.…”
Get full text
Get full text
Thesis -
3
Design and implementation of real data fast fourier transform processor on field programmable gates array
Published 2015“…In this work, the memorybased FFT processor, based on radix-4 FFT algorithm is implemented on Cyclone II Field Programmable Gates Array (FPGA). …”
Get full text
Get full text
Thesis -
4
Application of the Whale Optimization Algorithm (WOA) in Reservoir Optimization Operation Under Investigation of Climate Change Impact: A Case Study at Klang Gate Dam, Malaysia
Published 2024“…The effectiveness of analyzing large amounts of data that comes with engaging climate change scenarios, for planning advanced reservoir management can be achieved through the use of optimization algorithms. …”
Conference Paper -
5
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
6
-
7
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…To fully utilize the performance potential of XTS mode of operation, a parallel design for the algorithm is proposed. …”
Get full text
Get full text
Thesis -
8
Predicting machine failure using recurrent neural network-gated recurrent unit (RNN-GRU) through time series data
Published 2021“…It helps those sectors such as production to foresee the state of machine in line with saving the cost from sudden breakdown as unplanned machine failure can disrupt the operation and loss up to millions. Thus, this paper offers a deep learning algorithm named recurrent neural network-gated recurrent unit (RNN-GRU) to forecast the state of machines producing the time series data in an oil and gas sector. …”
Get full text
Get full text
Article -
9
Design of an advanced encryption standard crypto-processor core for field programmable gate array implementation
Published 2006“…The proposed AES Crypto-Processor accelerates the AES algorithm in reconfigurable Field Programmable Gate Arrays (FPGA). …”
Get full text
Get full text
Thesis -
10
Optimization of reservoir operation at Klang Gate Dam utilizing a whale optimization algorithm and a L�vy flight and distribution enhancement technique
Published 2023“…Taking it further, the KGD was studied using the nature-inspired meta-heuristic algorithms (MHAs). The Whale Optimisation Algorithm (WOA) solves complex technical issues. …”
Article -
11
Meta-heuristic approaches for reservoir optimisation operation and investigation of climate change impact at Klang gate dam
Published 2023“…Consequently, seeking managing of reservoir optimisation operations had always been at the forefront and to improve managing, algorithms have had been presented over the past few decades, beginning with conventional algorithms, followed by heuristic algorithms, and finally, the meta-heuristic algorithms (MHAs). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
13
Pipeline implementation of secure hash algorithm (SHA-l) for cryptographic application in network security
Published 2000“…All input output data interface and internal operations are performed in 32-bit width. …”
Get full text
Get full text
Conference or Workshop Item -
14
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…The hardware based of encryption chip become realizable with Field Programmable Gate Arrays (FPGAs). There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
Get full text
Get full text
Monograph -
15
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
-
17
-
18
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
20
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
