Search Results - (( java implication based algorithm ) OR ( programming practice tool algorithm ))

Refine Results
  1. 1

    Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming by Hussien, Hassan Mansur, Md Yasin, Sharifah, Muda, Zaiton, Udzir, Nur Izura

    Published 2019
    “…The extended MILP technique is able to provide an automatic security estimation tool by giving accurate results. Overall, it is applicable to an extensive variety of block cipher algorithm that makes it an adaptable tool for industrial purposes and scholarly research.…”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Metaheuristic Algorithms Based on Compromise Programming for the Multi-Objective Urban Shipment Problem by Ngo, T.S., Jaafar, J., Aziz, I.A., Aftab, M.U., Nguyen, H.G., Bui, N.A.

    Published 2022
    “…We evaluated the effectiveness of the proposed algorithm with the Tabu Search algorithm and the original genetic algorithm on the tested dataset. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Scheduling of batch process plant / Abdul Aziz Abu Bakar by Abu Bakar, Abdul Aziz

    Published 1995
    “…By using Turbo Pascal programming language, major programs are linked and displayed. …”
    Get full text
    Get full text
    Student Project
  5. 5

    AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm by Salim, Nur Saadah, Saad, Shahadan

    Published 2025
    “…The SVM algorithm, a supervised learning model, plays a crucial role in improving the efficiency of tool selection, ultimately enhancing the speed and adaptability of vulnerability detection processes. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    AI recommendation penetration testing tools for password attacks: random forest by Rozman, Nurulasyiqin, Saad, Shahadan

    Published 2025
    “…This project developed an AI-based recommendation system using the Random Forest algorithm to address the complexities of selecting appropriate penetration testing tools for password attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Al... by Eka Wahyu, Aditya, Nur Haryani, Zakaria, Fazli, Azzali, Mohamad Nazim, Jambli

    Published 2024
    “…The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  8. 8

    Low-level hybridization scripting language with dynamic parameterization in PSO-GA / Suraya Masrom by Masrom, Suraya

    Published 2015
    “…In addition, research has identified that the existing tools are not adequately designed to enable users to easily develop the LLH algorithms with the dynamic parameterization.In responding to this problem, this research investigates rapid mechanisms for the LLH design and development with easy, flexible and concise programming. …”
    Get full text
    Get full text
    Thesis
  9. 9

    'Chapter 10: 5G-enabled IoT applications in healthcare: Transforming the Industry 5.0 healthcare landscape' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 T... by Mohamad Nazim, Jambli, Mohamad Zul Haziq, Mohd Fadzli, Sinarwati, Mohamad Suhaili, Nur Haryani, Zakaria

    Published 2024
    “…The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  10. 10

    CONTINGENCY ANALYSIS OF POWER SYSTEM NETWORKS by ABDUL RAUF, MOHD HAFIZ

    Published 2006
    “…This project presents an alternative way of conducting power flow analysis in determining the new bus voltages and line currents during outage occurrence. The algorithms have been accommodated in one complete program making it an effective tool for contingency analysis. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Automated time series forecasting by Ismail, Suzilah, Zakaria, Rohaiza, Tuan Muda, Tuan Zalizam

    Published 2011
    “…While quantitative technique is based on statistical concepts and requires large amount of data in order to formulate the mathematical models.This technique can be classified into projective and causal technique.The projective technique (or univariate modelling) just involve one variable while the causal technique (or econometric modelling) suitable for multi-variables.Since forecasting involves uncertainty, several methods need to be executed on one set of time series data in order to produce accurate forecast.Hence, usually in practice forecaster need to use several softwares to obtain the forecast values.If this practice can be transformed into algorithm (well-defined rules for solving a problem) and then the algorithm can be transformed into a computer program, less time will be needed to compute the forecast values where in business world time is money.In this study, we focused on algorithm development for univariate forecasting techniques only and will expand towards econometric modelling in the future.Two set of simulated data (yearly and non-yearly) and several univariate forecasting techniques (i.e. …”
    Get full text
    Get full text
    Get full text
    Monograph
  12. 12

    Robotics in Education by Norashikin, M. Thamrin, Addie, Irawan, Zurita, Zulkifli, Syed Abdul Mutalib, Al Junid, Megat Syahirul Amin, Megat Ali, Anwar P. P., Abdul Majeed

    Published 2026
    “…Spanning six chapters, it examines robotics’ ability to enhance technical and collaborative skills while addressing challenges such as resource accessibility and curriculum integration. Core programming concepts, including control systems, algorithm design, and debugging, are elaborated upon using tools like Python and ROS. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book
  13. 13
  14. 14

    A Stepper Motor Design Optimization Using by Wong, Chin Wei

    Published 2005
    “…There is a need to fill this void in the area of small-motor design, and develop a program using Genetic Algorithms (GAs) as an approach to achieve optimization. …”
    Get full text
    Get full text
    Monograph
  15. 15
  16. 16

    Personal mobile-health application by Lim, Jeremy Yeu Shuo

    Published 2025
    “…The Android-based mobile health application will employ ML-driven algorithms to diagnose the risk of chronic diseases, giving users personalized early warnings and proactive health management tools. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17
  18. 18

    Discrete-time system identification using genetic algorithm with single parent-based mating technique by Zainuddin, Farah Ayiesya

    Published 2024
    “…This study not only advances the theoretical understanding of GA but also provides practical methodologies that can be applied to real-world problems, making it a valuable contribution to both academic research and practical applications.…”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Counting roots of the Polynomial systems by using mixed volume of the Newton polytopes / Nur Suhailah Norazhar, Nur Ain Sofiya Zainuri and Nor Suhada Mohd Rosdi by Norazhar, Nur Suhailah, Zainuri, Nur Ain Sofiya, Mohd Rosdi, Nor Suhada

    Published 2024
    “…In addition, it is important to focus on addressing any potential factors that may affect the accuracy and reliability of root counting algorithms in computational programs like Maple. Collaboration among experts in the same field is essential for advancing computational tools in this domain. …”
    Get full text
    Get full text
    Student Project