Search Results - (( programming ability function algorithm ) OR ( java data prevention algorithm ))

Refine Results
  1. 1

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  2. 2

    An improved grey wolf with whale algorithm for optimization functions by Asgher, Hafiz Maaz

    Published 2022
    “…The performance of the proposed algorithm is tested and evaluated on five benchmarked unimodal and five multimodal functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Novel techniques for voltage stability assessment and improvement in power system / Ismail Musirin. by Musirin, Ismail

    Published 2004
    “…The results obtained from the voltage stability analysis using FVSI were utilized to predict system violation, identify most sensitive line corresponds to a load bus and estimate the maximum load ability and operating margin in the system. A new Evolutionary programming (EP) based acceleration search algorithm was developed to accelerate the process in estimating maximum load ability in a power system. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Evaluation of fast evolutionary programming, firefly algorithm and mutate-cuckoo search algorithm in single-objective optimization / Muhammad Zakyizzuddin Rosselan, Shahril Irwan S... by Rosselan, Muhammad Zakyizzuddin, Sulaiman, Shahril Irwan, Othman, Norhalida

    Published 2016
    “…FEP and MCSA are based on the conventional Evolutionary Programming (EP) and Cuckoo Search Algorithm (CSA) with modifications and adjustment to boost up their search ability. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring by Ab Halim, Haizum Hanim

    Published 2021
    “…Smart Meter (SM) is an intelligent device with additional functions which include the ability to measure and record energy consumptions, and allows two-way communication with the utility for automated monitoring, and accurate billing management. …”
    Get full text
    Get full text
    Thesis
  6. 6

    CSC099: Foundation Computing II / Centre of Foundation Studies by UiTM, Centre of Foundation Studies

    Published 2022
    “…This course introduces basic computer programming algorithm, problem solving, structured programming language, selection structure, repetition structure, function and array. …”
    Get full text
    Get full text
    Get full text
    Teaching Resource
  7. 7

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…Obfuscation (Obfu) is a practice to make the programming code complicated to protect the Intellectual Property (IP) and prevent prohibited software Reverse Engineering (RE). …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…Machine Learning is one of the ways as a preventive method by applying the data collected from the clogging experiment in the vibration lab to build up a machine learning model for classification of flow blockage levels in the centrifugal pump. …”
    Get full text
    Get full text
    Monograph
  11. 11

    The implications for ahybrid detection technique against malicious sqlattacks on web applications by Bahjat Arif, Sarajaldeen Akram, Wani, Sharyar

    Published 2025
    “…It is a code with double shield protection that prevents unauthorized extraction or damaging the remote database in the server side due to malicious SQL injection. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Neuro Symbolic Integration and Agent Based Modelling by Sathasivam , Saratha, Velavan, Muraly

    Published 2018
    “…It has synaptic strength pattern which involve Lyapunov function E (energy function) for energy minimization events. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    TELE-OPERATED ROBOT USING VC PROGRAMMING PROTOCOL by Hasbi, Ahmad Farhan

    Published 2007
    “…The development stages are comprised of structure and mechanism construction, electronic circuit development and programming algorithms generation. The tele-operated robot functions as a transporter. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Ultrasonic Tomography System For Liquid/Gas Flow: Frame Rate Comparison Between Visual Basic And Visual C++ Programming by Abdul Rahim, Ruzairi, Mohd. Nayan, Norkharziana, Fazalul Rahiman, Mohd. Hafiz

    Published 2006
    “…Besides having an ability of higher processing speed, Visual C++ also encapsulates an extended function compared to Visual Basic. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Optimization Of Fuzzy Logic Controllers With Genetic Algorithm For Two-Part-Type And Re-Entrant Production Systems by Homayouni, Seyed Mahdi

    Published 2008
    “…Furthermore, genetic algorithm (GA) has been used to optimize the FLCs performance. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Investigating The Performance Of Metaheuristics To Optimize The Revenue Of Semiconductor Supply Chain by Roslee, Muhammad Sharifuddin

    Published 2022
    “…Below is the comparison of the fitness value among 20 metaheuristics algorithms run through Python programming.…”
    Get full text
    Get full text
    Monograph
  19. 19

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20