Search Results - (( programming ability function algorithm ) OR ( java data prevention algorithm ))
Search alternatives:
- prevention algorithm »
- function algorithm »
- ability function »
- data prevention »
- java »
-
1
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
2
An improved grey wolf with whale algorithm for optimization functions
Published 2022“…The performance of the proposed algorithm is tested and evaluated on five benchmarked unimodal and five multimodal functions. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Novel techniques for voltage stability assessment and improvement in power system / Ismail Musirin.
Published 2004“…The results obtained from the voltage stability analysis using FVSI were utilized to predict system violation, identify most sensitive line corresponds to a load bus and estimate the maximum load ability and operating margin in the system. A new Evolutionary programming (EP) based acceleration search algorithm was developed to accelerate the process in estimating maximum load ability in a power system. …”
Get full text
Get full text
Thesis -
4
Evaluation of fast evolutionary programming, firefly algorithm and mutate-cuckoo search algorithm in single-objective optimization / Muhammad Zakyizzuddin Rosselan, Shahril Irwan S...
Published 2016“…FEP and MCSA are based on the conventional Evolutionary Programming (EP) and Cuckoo Search Algorithm (CSA) with modifications and adjustment to boost up their search ability. …”
Get full text
Get full text
Get full text
Article -
5
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…Smart Meter (SM) is an intelligent device with additional functions which include the ability to measure and record energy consumptions, and allows two-way communication with the utility for automated monitoring, and accurate billing management. …”
Get full text
Get full text
Thesis -
6
CSC099: Foundation Computing II / Centre of Foundation Studies
Published 2022“…This course introduces basic computer programming algorithm, problem solving, structured programming language, selection structure, repetition structure, function and array. …”
Get full text
Get full text
Get full text
Teaching Resource -
7
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Obfuscation (Obfu) is a practice to make the programming code complicated to protect the Intellectual Property (IP) and prevent prohibited software Reverse Engineering (RE). …”
Get full text
Get full text
Thesis -
8
-
9
Development of obstacle avoidance technique in web-based geographic information system for traffic management using open source software
Published 2014“…By implementing this function, it enhances the Dijkstra algorithm ability in network analysis. …”
Get full text
Get full text
Get full text
Article -
10
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…Machine Learning is one of the ways as a preventive method by applying the data collected from the clogging experiment in the vibration lab to build up a machine learning model for classification of flow blockage levels in the centrifugal pump. …”
Get full text
Get full text
Monograph -
11
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…It is a code with double shield protection that prevents unauthorized extraction or damaging the remote database in the server side due to malicious SQL injection. …”
Get full text
Get full text
Get full text
Article -
12
The child tracker using location awareness / Muhammad Idham Amdan
Published 2017Get full text
Get full text
Thesis -
13
Neuro Symbolic Integration and Agent Based Modelling
Published 2018“…It has synaptic strength pattern which involve Lyapunov function E (energy function) for energy minimization events. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
TELE-OPERATED ROBOT USING VC PROGRAMMING PROTOCOL
Published 2007“…The development stages are comprised of structure and mechanism construction, electronic circuit development and programming algorithms generation. The tele-operated robot functions as a transporter. …”
Get full text
Get full text
Final Year Project -
15
Ultrasonic Tomography System For Liquid/Gas Flow: Frame Rate Comparison Between Visual Basic And Visual C++ Programming
Published 2006“…Besides having an ability of higher processing speed, Visual C++ also encapsulates an extended function compared to Visual Basic. …”
Get full text
Get full text
Get full text
Article -
16
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Optimization Of Fuzzy Logic Controllers With Genetic Algorithm For Two-Part-Type And Re-Entrant Production Systems
Published 2008“…Furthermore, genetic algorithm (GA) has been used to optimize the FLCs performance. …”
Get full text
Get full text
Thesis -
18
Investigating The Performance Of Metaheuristics To Optimize The Revenue Of Semiconductor Supply Chain
Published 2022“…Below is the comparison of the fitness value among 20 metaheuristics algorithms run through Python programming.…”
Get full text
Get full text
Monograph -
19
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
20
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019Get full text
Get full text
Thesis
