Search Results - (( making causing problems algorithm ) OR ( java application matching algorithm ))

Refine Results
  1. 1

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…Long and variable key length made key exhaustive search and differential attack impossible. None fixed size key caused avoidance of replaying and other attacks that can happen on fixed sized key algorithms. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Tolerable Constructive Graph-Based Hyper-Heuristic Algorithm For Examination Timetabling by Mohammad Pour, Shahrzad

    Published 2009
    “…The main cause for the local optimal problem is that heuristic algorithms either focus on exploration (global improvement) rather than exploitation (local improvement) or vice versa.…”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6
  7. 7

    Design of a flexible digital baseband signal processing algorithm by Mohamad, Rosalina, Harun, Harlisya, Nuzli, Mohamad Anas, Dimyati, Kaharudin

    Published 2006
    “…In this paper, we show how we solved the problem by satisfying several requirements simultaneously: 1) removing loop or complicated algorithm in DBSP functions with flexible DBSP algorithm 2) using DSP-BIOS Scheduling module to increase performance and make sure our sample data are in packed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Securing cloud data system (SCDS) for key exposure using AES algorithm by Thabet Albatol, Mohammed Samer Hasan

    Published 2021
    “…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Predicting future sales using genetic algorithm: data mining sales / Siti Hajar Yaacob by Yaacob, Siti Hajar

    Published 2014
    “…This problem can cause the imbalance in sales. Based on the problem statement, Genetic Algorithm was applied to test whether it is compatible to predict the future sales. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni by Ahmad Husni, Ahmad Farhan

    Published 2013
    “…Man in The Middle Attack (MiTM) can manipulate and give false information to the sender. This problem can cause a big impact to the businessman when they do trading transaction. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Ant colony optimization (ACO) algorithm for CNC route problem by Wan Nur Farhanah , Wan Zakaria

    Published 2012
    “…However, the CNC machines do not choose the optimal route when completing their task and this caused the high cost problem on the machining. This project proposes a new optimization technique which applies ant behavior, for finding the optimal route in PCB holes drilling process. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    A multiple mitosis genetic algorithm by Kamil K., Chong K.H., Hashim H., Shaaya S.A.

    Published 2023
    “…Having great advantages on solving optimization problem makes this method popular among researchers to improve the performance of simple Genetic Algorithm and apply it in many areas. …”
    Article
  13. 13

    A backward recovery mechanism in preemptive utility accrual real time scheduling algorithm by Ahmad, Idawaty, Othman, Muhammad Fauzan

    Published 2010
    “…Problem statement: This study proposed a robust algorithm named as Backward Recovery Preemptive Utility Accrual Scheduling (BRPUAS) algorithm that implements the Backward Recovery(BR) mechanism as a fault recovery solution under the existing utility accrual scheduling environment. …”
    Get full text
    Get full text
    Article
  14. 14

    A multi-layer dimension reduction algorithm for text mining of news in forex / Arman Khadjeh Nassirtoussi by Nassirtoussi, Arman Khadjeh

    Published 2015
    “…Therefore, this work produces a multi-layer dimension reduction algorithm to respond to this need. The algorithm tackles a different root cause of the problem at each layer. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Design and Implementation of PID Controller for the Cooling Tower?s pH Regulation Based on Particle Swarm Optimization PSO Algorithm by Al-Najari B.M.A., Hen C.K., Paw J.K.S., Marhoon A.F.

    Published 2025
    “…The deviation in PH parameter affects the pipes, such as corrosion and scale. Acidic water causes pipes to corrode, and alkaline water causes pipes to scale. …”
    Article
  16. 16
  17. 17

    Shortest path from Bandar Tun Razak to Berjaya Times Square using Dijkstra Algorithm / Nur Syuhada Muhammat Pazil ... [et al.] by Muhammat Pazil, Nur Syuhada, Mahmud, Norwaziah, Jamaluddin, Siti Hafawati, Mustafa, Nur Farasyaqirra

    Published 2020
    “…The time wasted on the road causes a lot of problems to the users. Furthermore, the costs between two destinations are rather expensive. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    Segmentation of Magnetic Resonance Brain Images Using Watershed Algorithm by Abdurrahim, Salem Hamed

    Published 2004
    “…It is also proven that the placement of internal and external markers into regions of interest (i.e. making the system interactive) can easily cope with the over-segmentation problem of the watershed.…”
    Get full text
    Get full text
    Thesis