Search Results - (( java implementation level algorithm ) OR ( using ((models using) OR (code using)) algorithm ))

Refine Results
  1. 1

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional by Haron, Habibollah

    Published 2006
    “…These algorithm are used to produce chain code series that represented a thinned binary image of the sketch. …”
    Get full text
    Get full text
    Monograph
  6. 6

    Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar by Subri, Syarul Haniz

    Published 2006
    “…Back propagation neural network algorithm was used to develop and produce the classifier for corner detector algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Fast multilayer color QR code decoder algorithm utilizing fuzzy technique by Badawi, Bakri, Mohd Aris, Teh Noranis, Mustapha, Norwati, Manshor, Noridayu

    Published 2020
    “…Next, build a dynamic fuzzy membership, from the color reference set of the extended color QR code and fast color enhancement using the center color pixel for each model. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Enhanced algorithms for three-dimensional object interpreter by Haron, Habibollah

    Published 2004
    “…The second is the modified Freeman chain code algorithm that is used to produce chain code series that represented a thinned binary image of the sketch. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    Analysis of Toothbrush Rig Parameter Estimation Using Different Model Orders in Real Coded Genetic Algorithm (RCGA) by Ainul, H. M. Y., Salleh, S. M., Halib, N., Taib, H., Fathi, M. S.

    Published 2024
    “…Generation gap used was 0.5 has shorten the algorithm conver-gence time without affecting the model accuracy.…”
    Article
  11. 11

    Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code by Badawi, Bakri

    Published 2022
    “…A new colour QR code algorithm known as a Fuzzy QR code (FQR code) was proposed to solve the problems faced by current colour QR codes. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Analysis of toothbrush rig parameter estimation using different model orders in Real-Coded Genetic Algorithm (RCGA) by Ainul, H. M. Y., Salleh, S. M., Halib, N., Taib, H., Fathi, M. S.

    Published 2018
    “…Generation gap used was 0.5 has shorten the algorithm convergence time without affecting the model accuracy.…”
    Get full text
    Article
  13. 13

    Discretization of crack propagation on parallel computing : complexity and parallel algorithms with source code by Alias, Norma, Islam, Md. Rajibul

    Published 2010
    “…The mathematical model was developed by using the relationship between the forces applied to the individual elements and the nodal displacements. …”
    Get full text
    Get full text
    Get full text
    Book Section
  14. 14

    Real-coded genetic algorithm for parametric modelling of a TRMS by Toha, Siti Fauziah, Tokhi, Mohammad Osman

    Published 2009
    “…The effectiveness of the proposed algorithm is demonstrated in comparison to a binary-coded GA in modelling the TRMS. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    Study of optimal EG placement in radial distribution system using real coded genetic algorithm by M. H., Sulaiman, Omar, Aliman

    Published 2011
    “…RCGA is a method that uses continuous floating numbers as representation which is different from conventional GA which is using binary numbers. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    A Real-Coded Dynamic Genetic Algorithm For Optimizing Driver’s Model In Emission Test Cycle by Zeratul Izzah, Mohd Yusoh, Hisashi, Tamaki, Kazuhide, Togai

    Published 2015
    “…This paper proposes a real-coded Genetic Algorithm for finding optimal parameters’ values of a driver’s model. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Single Frame Profilometry With Rapid Phase Demodulation On Colour-Coded Fringes by Yee, Cong Kai

    Published 2019
    “…Simplification of geometric model by using inherent slanted projection angle in off-the-shelf projector was also studied in this work. …”
    Get full text
    Get full text
    Thesis
  18. 18

    An optimum drill bit selection technique using artificial neural networks and genetic algorithms to increase the rate of penetration by Momeni, M., Hosseini, S.J., Ridha, S., Laruccia, M.B., Liu, X.

    Published 2018
    “…However, some researchers have used bit codes as input or output variables. This paper illustrates that the bit codes are better used in referring to the name of each bit instead of using them as values for calculation in the ANN model. …”
    Get full text
    Get full text
    Article
  19. 19

    Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection by Nadheer Abdulridha, Shalash

    Published 2015
    “…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Discretization of crack propagation on parallel computing: complexity and parallel algorithms with source code by Alias, Norma, Islam, Md. Rajibul

    Published 2010
    “…The mathematical model was developed by using the relationship between the forces applied to the individual elements and the nodal displacements. …”
    Get full text
    Get full text
    Get full text
    Book