Search Results - (( making process force algorithm ) OR ( java application optimisation algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Cryptanalysis in cryptographic algorithm design by Z'aba, Muhammad Reza, Ahmad, Badrisham, Ibrahim, Subariah, Maarof, Mohd. Aizaini

    Published 2006
    “…Brute force is the process of searching for all possible values of the key. …”
    Get full text
    Conference or Workshop Item
  3. 3

    Calibration of optical based silicone tactile sensor based on image deformation technique / Abdul Halim Esa by Esa, Abdul Halim

    Published 2016
    “…Inspiring by human finger model, a silicon tactile sensor is proposed to low force object gripping and sensorization task. To make sure proposed tactile sensor feasibility, this optical tactile sensor underwent calibration process. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Securing password authentication using MD5 algorithm by Siti Nabilah , Mohammad Zain

    Published 2014
    “…This project is about to make sure that system integrity is secure by using cryptographic based encryption method.Multi —application usability of password today forcing users to have proper memory aids. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Multi-objectives process optimization in end milling process of aluminium alloy 6061-T6 using genetic algorithm by W., Safiei, Rahman, M. M., M.Y., Ali

    Published 2024
    “…For future study, other methods or algorithms can be applied in other machining processes to obtain optimum machining parameters.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Application of system identification method coupled with evolutionary algorithms for the optimization of power consumption in a pem fuel cell propulsion system / Suhadiyana Hanapi by Hanapi, Suhadiyana

    Published 2018
    “…Three alternative configurations of a vehicle system were considered namely, without DC/DC converter, with DC/DC converter on the supercapacitors side and with DC/DC converter on the PEM fuel cell side. In the process of evaluating the best system configuration, Multi-Criteria Decision Making technique (MCDM) through the Analytical Hierarchy Process (AHP), was used for evaluation, comparison and applicability assessment. …”
    Get full text
    Get full text
    Book Section
  9. 9
  10. 10

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…A key schedule algorithm is the mechanism that generates and schedules all session-keys for the encryption process. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…We introduce a new algorithm that could detect fraud activities in telecommunication industry (e.g. intrusion fraud which occurs when legitimate account is comprised by an intruder who makes or sells calls on this account) that uses Gaussian Mixed Model (or GMM), a probabilistic model normally used in fraud detection via speech recognition. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Classification models for higher learning scholarship award decisions by Wirawati Dewi Ahmad, Azuraliza Abu Bakar

    Published 2018
    “…A dataset of successful and unsuccessful applicants was taken and processed as training data and testing data used in the modelling process. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…In terms of security, the proposed solution is studied against brute-force attacks and the analysis shows that the new algorithm can withstand this type of attack with an ample amount of hiding possibilities that make the process of retrieving the message extremely diffi- cult. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Multi-array sensorised pillowcase as call detection alarm system for in ward tetraplegic patient / Normazlianita Mohamad Alias by Normazlianita, Mohamad Alias

    Published 2021
    “…In this study, we utilized off-the-shelf materials to form: i) a fabric-based multiarray pressure sensor system, ii) an acquisition circuit along with interface and signal processing algorithms to acquire and interpret the sensor data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations by Jaafar, Abdullah Mohammed Abdo Ali

    Published 2011
    “…However, most of the existing public-key algorithms are based on complex mathematical computations. …”
    Get full text
    Get full text
    Thesis
  16. 16

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. The performance of the recommended approach makes it possible to thwart an attack using brute force considerably more fast than is possible with the encryption technologies that are currently in use. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Development of DNA-based dynamic key-dependent block cipher by Saeed, Auday H.

    Published 2015
    “…For the permutation layer the use of key-dependent ransformations and processes inspired by DNA techniques forces the attackers to try and devise hard new frameworks of cryptanalytic mechanisms. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20