Search Results - (( making process force algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- java application »
- force algorithm »
- process force »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Cryptanalysis in cryptographic algorithm design
Published 2006“…Brute force is the process of searching for all possible values of the key. …”
Get full text
Conference or Workshop Item -
3
Calibration of optical based silicone tactile sensor based on image deformation technique / Abdul Halim Esa
Published 2016“…Inspiring by human finger model, a silicon tactile sensor is proposed to low force object gripping and sensorization task. To make sure proposed tactile sensor feasibility, this optical tactile sensor underwent calibration process. …”
Get full text
Get full text
Thesis -
4
Securing password authentication using MD5 algorithm
Published 2014“…This project is about to make sure that system integrity is secure by using cryptographic based encryption method.Multi —application usability of password today forcing users to have proper memory aids. …”
Get full text
Get full text
Undergraduates Project Papers -
5
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
6
-
7
Multi-objectives process optimization in end milling process of aluminium alloy 6061-T6 using genetic algorithm
Published 2024“…For future study, other methods or algorithms can be applied in other machining processes to obtain optimum machining parameters.…”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Application of system identification method coupled with evolutionary algorithms for the optimization of power consumption in a pem fuel cell propulsion system / Suhadiyana Hanapi
Published 2018“…Three alternative configurations of a vehicle system were considered namely, without DC/DC converter, with DC/DC converter on the supercapacitors side and with DC/DC converter on the PEM fuel cell side. In the process of evaluating the best system configuration, Multi-Criteria Decision Making technique (MCDM) through the Analytical Hierarchy Process (AHP), was used for evaluation, comparison and applicability assessment. …”
Get full text
Get full text
Book Section -
9
Inchworm robot grippers in clothes manipulation - Optimizing the tracing algorithm
Published 2023Conference paper -
10
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…A key schedule algorithm is the mechanism that generates and schedules all session-keys for the encryption process. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff
Published 2014“…We introduce a new algorithm that could detect fraud activities in telecommunication industry (e.g. intrusion fraud which occurs when legitimate account is comprised by an intruder who makes or sells calls on this account) that uses Gaussian Mixed Model (or GMM), a probabilistic model normally used in fraud detection via speech recognition. …”
Get full text
Get full text
Get full text
Thesis -
12
Classification models for higher learning scholarship award decisions
Published 2018“…A dataset of successful and unsuccessful applicants was taken and processed as training data and testing data used in the modelling process. …”
Get full text
Get full text
Get full text
Article -
13
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…In terms of security, the proposed solution is studied against brute-force attacks and the analysis shows that the new algorithm can withstand this type of attack with an ample amount of hiding possibilities that make the process of retrieving the message extremely diffi- cult. …”
Get full text
Get full text
Get full text
Thesis -
14
Multi-array sensorised pillowcase as call detection alarm system for in ward tetraplegic patient / Normazlianita Mohamad Alias
Published 2021“…In this study, we utilized off-the-shelf materials to form: i) a fabric-based multiarray pressure sensor system, ii) an acquisition circuit along with interface and signal processing algorithms to acquire and interpret the sensor data. …”
Get full text
Get full text
Get full text
Thesis -
15
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
Published 2011“…However, most of the existing public-key algorithms are based on complex mathematical computations. …”
Get full text
Get full text
Thesis -
16
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. The performance of the recommended approach makes it possible to thwart an attack using brute force considerably more fast than is possible with the encryption technologies that are currently in use. …”
Get full text
Get full text
Get full text
Thesis -
17
Development of DNA-based dynamic key-dependent block cipher
Published 2015“…For the permutation layer the use of key-dependent ransformations and processes inspired by DNA techniques forces the attackers to try and devise hard new frameworks of cryptanalytic mechanisms. …”
Get full text
Get full text
Thesis -
18
Quality prediction and classifcation of resistance spot weld using artifcial neural network with open‑sourced, self‑executable andGUI‑based application tool Q‑Check
Published 2023“…Optimizing Resistance spot welding, often used as a time and cost-efective process in many industrial sectors, is very time-consuming due to the obscurity inherent within process with numerous interconnected welding parameters. …”
Get full text
Get full text
Get full text
Article -
19
Quality prediction and classifcation of resistance spot weld using artifcial neural network with open‑sourced, self‑executable andGUI‑based application tool Q‑Check
Published 2023“…Optimizing Resistance spot welding, often used as a time and cost-efective process in many industrial sectors, is very time-consuming due to the obscurity inherent within process with numerous interconnected welding parameters. …”
Get full text
Get full text
Get full text
Article -
20
Quality prediction and classifcation of resistance spot weld using artifcial neural network with open‑sourced, self‑executable andGUI‑based application tool Q‑Check
Published 2023“…Optimizing Resistance spot welding, often used as a time and cost-efective process in many industrial sectors, is very time-consuming due to the obscurity inherent within process with numerous interconnected welding parameters. …”
Get full text
Get full text
Get full text
Article
