Search Results - (( java implementation change algorithm ) OR ( systematic implementation using algorithm ))

Refine Results
  1. 1

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…This tool can be an educational assistant for beginners to learn metaheuristic in theoretical lectures as well as practical sessions. Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Metaheuristic nature-inspired algorithms for reservoir optimization operation: A systematic literature review by Nor Shuhada, Ibrahim, Nafrizuan, Mat Yahya, Saiful Bahri, Mohamed

    Published 2022
    “…Overall, 24 articles that passed the minimum quality were retrieved using systematic searching strategies.…”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A fault syndromes simulator for random access memories by Wan Hasan, Wan Zuha, Abdul Halim, Izhal, Mohd Sidek, Roslina, Othman, Masuri

    Published 2008
    “…This work is focused on incorporating the March based test algorithm using a software simulator tool for implementing a fast and systematic memory testing algorithm. …”
    Get full text
    Get full text
    Article
  8. 8

    SYSTEMATIC DESIGN OF SIMPLY STRUCTURED COMPENSATOR by FUNG , CHUN TING

    Published 2005
    “…Then, data are generated to be used in training the neural network. The NN is used to predict the tuning parameters of PID controller for second order system. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    An efficient fault syndromes simulator for SRAM memories by Wan Hasan, Wan Zuha, Abdul Halin, Izhal, Mohd Sidek, Roslina, Othman, Masuri

    Published 2009
    “…This work is focused on incorporating the March based test algorithm using a software simulator tool for implementing a fast and systematic memory testing algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Integrated applications of building information modeling in project cost management: a systematic review by M. Farouk, Abdelrahman, Rahimi, A. Rahman

    Published 2023
    “…Researchers and industry professionals can use the study findings to increase the benefits of implementing BIM in construction projects.…”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Y-type Random 2-satisfiability In Discrete Hopfield Neural Network by Guo, Yueling

    Published 2024
    “…The rule namely Y-Type Random 2-Satisfiability is proposed by combining the systematic and non-systematic logical rule. Next, the newly proposed logical rule as the symbolic instruction was implemented into the Discrete Hopfield Neural Network to govern the neurons of the network. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The aim of this paper is implementation of system computation between Cryptography and Steganography which embeds information in unused area 2 within EXE files to find a secure solution to cover file without change the size of cover file. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A controller based on Optimal Type-2 Fuzzy Logic: Systematic design, optimization and real-time implementation by Fayek, H.M., Elamvazuthi, I., Perumal, N., Venkatesh, B.

    Published 2014
    “…The main scheme is to optimize the gains of the controller using Particle Swarm Optimization (PSO), then optimize only two parameters per type-2 membership function using Genetic Algorithm (GA). …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    Rainfall prediction system using Artificial Neural Network (ANN) / Izzat Izzuddin Zulkarnain by Zulkarnain, Izzat Izzuddin

    Published 2024
    “…The methodology employed a systematic approach, including data collection, pre-processing, prototype architecture design, algorithm implementation, and evaluation. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Modelling Autonomous Evacuation Navigation System (AENS) for optimal route using Dijkstra's algorithm by Abu Samah, Khyrina Airin Fariza

    Published 2016
    “…Through ST adaptation, all subsystems were integrated and using the “Dijkstra’s algorithm” (DA) by modifying its function from shortest path algorithm to safest and shortest algorithm, to the nearest exit. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20