Search Results - (( java application optimisation algorithm ) OR ( construct security optimization algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Optimization of medical image steganography using n-decomposition genetic algorithm by Al-Sarayefi, Bushra Abdullah Shtayt

    Published 2023
    “…The Least Significant Bits (LSB) technique has been widely used for secure communication. However, it is susceptible to imperceptibility and security risks due to the direct manipulation of pixels, and ASCII patterns present limitations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5
  6. 6

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  7. 7

    Crossover and mutation operators of real coded genetic algorithms for global optimization problems by Lim, Siew Mooi

    Published 2016
    “…Because the representations of the solutions are similar to the natural formulation, RCGA gets better-customized to the optimization of problems in a continuous domain. Throughout the years, there has been a shift in focus on constructing new crossover and mutation operators to improve the performance of GA in function optimization. …”
    Get full text
    Get full text
    Thesis
  8. 8

    OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA by DORE RAJA, ANAND A RAJA

    Published 2004
    “…For this project, 2 different optimized designs were implemented. The first design (Design I) was implemented with minimum hardware resources usage, using a single F -Function (modified) and was optimized with reasonable latency, throughput and throughput per gate. …”
    Get full text
    Get full text
    Final Year Project
  9. 9
  10. 10

    Optimization Of Twofish Encryption Algorithm On FPGA by Raja, Ananda Raja Dore, Zain Ali, Noohul Basheer, Hussin, Fawnizu Azmadi

    Published 2005
    “…For this project, 2 different optimized designs were implemented. The first design (Design I) was implemented with minimum hardware resources usage, using a single F -Function (modified) and was optimized with reasonable latency, throughput and throughput per gate. …”
    Get full text
    Conference or Workshop Item
  11. 11

    A neural network modal decomposition mechanism in predicting network traffic by Shi Jinmei

    Published 2023
    “…The proposed mechanism starts by using SABC to update the model with a new solution and fine-tune the disturbances in each iteration to deal with the interference in order to find the best values that are also synchronously optimal. The SAVE-AS then constructs an adaptive selection operator. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Data-driven rice yield predictions and prescriptive analytics for sustainable agriculture in Malaysia by Marong, Muhammad, Husin, Nor Azura, Zolkepli, Maslina, Affendey, Lilly Suriani

    Published 2024
    “…A comprehensive dataset for rice yield prediction in Malaysia was constructed, encompassing yield data from 2014 to 2018. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    ReSTiNet: An efficient deep learning approach to improve human detection accuracy by Shahriar Shakir, Sumi, Dayang Rohaya, Awang Rambli, Mirjalili, Seyedali, Miah, M. Saef Ullah, Muhammad Mudassir, Ejaz

    Published 2023
    “…Despite modern techniques, there are very few optimal techniques to construct networks with a small size, deep architecture, and fast training time while maintaining accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A new integrated approach for evaluating sustainable development in the electric vehicle sector by Lu, Wen Min, Chou, Chienheng, Ting, Irene Wei Kiong, Liu, Shangming

    Published 2025
    “…This study identifies the relative importance of the classification attribute variables based on the classification rules of the target attributes by conducting further analysis with the CART decision model and constructs an optimal prediction model.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    ReSTiNet: An Efficient Deep Learning Approach to Improve Human Detection Accuracy by Sumit, S.S., Rambli, D.R.A., Mirjalili, S., Miah, M.S.U., Ejaz, M.M.

    Published 2023
    “…Despite modern techniques, there are very few optimal techniques to construct networks with a small size, deep architecture, and fast training time while maintaining accuracy. …”
    Get full text
    Get full text
    Article
  16. 16

    ReSTiNet : An efficient deep learning approach to improve human detection accuracy by Sumit, Shahriar Shakir, Dayang Rohaya, Awang Rambli, Seyedali, Mirjalili, Miah, Md Saef Ullah, Muhammad Mudassir, Ejaz

    Published 2023
    “…Despite modern techniques, there are very few optimal techniques to construct networks with a small size, deep architecture, and fast training time while maintaining accuracy. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17