Search Results - (( java implication based algorithm ) OR ( basic integration new algorithm ))

Refine Results
  1. 1
  2. 2

    Design of nonlinear adaptive interaction algorithm controller for improvement of tracking performance of X-Y table ball screw drive system by Retas, Zain

    Published 2023
    “…The contribution is Nonlinear Adaptive Interaction Algorithm (NAIA). The controller is developed based on the enhancement and modification of the basic Adaptive Interaction Algorithm Controller (AIA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    Utilizing of flower pollination algorithm for brushless DC motor speed controller by Motakabber, S. M. A., Zahirul Alam, A. H. M., Nordin, Anis Nurashikin, Mahmud, Md

    Published 2020
    “…If the PID controller is modified with a new algorithm, better results can be obtained from the BLDC motor. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  6. 6
  7. 7

    Fuzzy algorithm for 3D coastal gemorphology mapping by DInSAR by Marghany, Maged, Hashim, Mazlan

    Published 2007
    “…The basic concept of fuzzy algorithm was used to filter DInSAR data. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A hybrid algorithm based on artificial bee colony and artificial rabbits optimization for solving economic dispatch problem by Lee, Wei Wen, Hashim, Mohd Ruzaini

    Published 2023
    “…The new hybrid algorithm integrates the good features of both standard optimization strategies, thus producing better possible solutions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations by Jaafar, Abdullah Mohammed Abdo Ali

    Published 2011
    “…Many public-key cryptosystems are used in our daily lives to attain privacy, authenticity, integrity and non-repudiation. However, most of the existing public-key algorithms are based on complex mathematical computations. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A new 128-bit block cipher by Mohd Ali, Fakariah Hani

    Published 2009
    “…Towards that and after reviewing related research, in this research we propose to come up with a new 128-bit block cipher cryptographic algorithm which shall meet the security requirements. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…It is relevant because it generalizes this process of music creation and provides instruments to musicians and non-musicians for diving into new, unique forms of musical expression. Genetic Algorithms will be chosen because they constantly improve solution, hence appropriate for the development of compositions consistent with the creative and harmonic principles. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory by Rusli, Julie Roslita

    Published 2011
    “…This tool can be used to ease the process of developing a new March test algorithm for NPSF.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad by Abd Rahman, Abdullah Sani, Ahmad, Samsiah

    Published 2022
    “…Time consuming and growing of websites complexity is additional reasons of the inadequate website assurance. This paper presents a new framework for websites integrity assurance through a website monitoring application. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension by Affandy

    Published 2015
    “…Taking into account from those main issues, this study introduces the new model of integrated algorithm-program visualization (ALPROV) for developing program comprehension tool. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…Web service technology defines several supporting protocols and specifications such as SOAP and WSDL for communication with client and server for data interchange. A new architectural paradigm has emerged in SOA in recent years called REpresentational State Transfer (REST) that is also used to integrate loosely coupled service components, named RESTful web services, by system integration consortiums. …”
    Get full text
    Get full text
    Article
  17. 17

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…Web service technology defines several supporting protocols and specifications such as SOAP and WSDL for communication with client and server for data interchange. A new architectural paradigm has emerged in SOA in recent years called REpresentational State Transfer (REST) that is also used to integrate loosely coupled service components, named RESTful web services, by system integration consortiums. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    A fuzzy case-based reasoning model for software requirements specifications quality assessment by Mostafa S.A., Gunasekaran S.S., Khaleefah S.H., Mustapha A., Jubair M.A., Hassan M.H.

    Published 2023
    “…Additionally, for efficient cases retrieval in the CBR, relevant cases selection and nearest cases selection heuristic search algorithms are used in the system. Basically, the input to the relevant cases algorithm is the available cases in the system case base and the output is the relevant cases. …”
    Article
  20. 20

    Exploration of educational building with cultural elements using shape grammar by Sebastian, Heng Junjie

    Published 2013
    “…During the design process, other rules are activated to embed new shapes within the basic building block. The rules are executed to generate designs to provide students a spacious environment for study and related activities. …”
    Get full text
    Get full text
    Undergraduates Project Papers