Search Results - (( problem implementation rendering algorithms ) OR ( java application customization algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    The Construction Of Quantum Block Cipher For Grover Algorithm by Eid, Almazrooie Mishal

    Published 2018
    “…Asymmetric cryptographic algorithms which are based on integer factorization or discrete logarithms problems are rendered unsecured against quantum attacks. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Multiperiod secure economic dispatch for large-scale power systems by Ab Ghani, Mohd Ruddin

    Published 1989
    “…The computational efficiency of the algorithm renders it suitable for on-line dispatch.…”
    Get full text
    Get full text
    Article
  4. 4

    Dynamic Secure Economic Dispatch For Large Scale Power System by Ab Ghani, Mohd Ruddin

    Published 1989
    “…The computational efficiency of the algorithm renders it suitable for on-line dispatch.…”
    Get full text
    Get full text
    Article
  5. 5

    An efficient real-time terrain data organization and visualization algorithm based on enhanced triangle-based level of detail technique by Zamri, Muhamad Najib

    Published 2006
    “…The purpose of this research is to design, develop and implement an algorithm for enhancing the rendering efficiency of triangle-based LOD technique. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Binary ant colony optimization algorithm in learning random satisfiability logic for discrete hopfield neural network by Gao, Yuan, Mohd Kasihmuddin, Mohd Shareduwan, Chen, Ju, Zheng, Chengfeng, Romli, Nurul Atiqah, Mansor, Mohd. Asyraf, Zamri, Nur Ezlin

    Published 2024
    “…This study introduced a novel ant colony optimization algorithm that implements the population selection strategy of the Estimation of Distribution Algorithm and a new pheromone updating formula. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    E-Raser: file shredder application with content replacement by using random words function by Mohd Nahar, Nur Farah Aqilah, Ab Rahman, Nurul Hidayah, Mohammad, Kamarudin Malik

    Published 2018
    “…The implemented algorithm replaced the original content of the files with uninformative words provided by the application. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Robust Data Fusion Techniques Integrated Machine Learning Models For Estimating Reference Evapotranspiration by Chia, Min Yan

    Published 2022
    “…The size of the dataset overwhelmed the problem’s dimensionality, thus rendering the bootstrap aggregating to be ineffective. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis