Search Results - (( using mitigation method algorithm ) OR ( java operation research algorithm ))

Refine Results
  1. 1

    A Hybrid K-Means Hierarchical Algorithm for Natural Disaster Mitigation Clustering by Prasetyadi, Abdurrakhman, Nugroho, Budi, Tohari, Adrin

    Published 2022
    “…Therefore, the proposed hybrid algorithm can provide relatively homogeneous clustering results in natural disaster mitigation.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…Then the next step was to test the mitigation algorithm, the same above scenarios of attack were repeated and the entropy change after the mitigation was observed. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Improving Class Timetabling using Genetic Algorithm by Qutishat, Ahmed Mohammed Ali

    Published 2006
    “…We have targeted the research on class timetabling problem. Hence, Genetic Algorithm (GA) is used as one of the most popular optimization solutions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe by Yakub Kayode, Saheed, Kazeem Alagbe, Gbolagade

    Published 2017
    “…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar by Tengku Jaafar, Tengku Salman Fathi

    Published 2006
    “…The genetic algorithm approach that been used in this research has been proven by other research study before that it will easily handle this types of problem where the optimal solution will be generated. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Face recognition and identification system (FaceRec) / Khew Jye Huei by Khew , Jye Huei

    Published 2004
    “…Besides that, the system will build in Windows 2000 Professional Operating System. The project approaches the research and development process as a two dimensional recognition problem, capturing the face image by using the web camera. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    Mitigation of harmonic current for balanced three-phase power system based on Extended Fryze Adaptive notch filter by Mohamad @ Abd Rahman, Syahrul Hisham, Mohd Radzi, Mohd Amran, Mailah, Nashiren Farzilah, Abd. Wahab, Noor Izzri, Jidin, Auzani

    Published 2023
    “…The algorithm's effectiveness in operation for the Shunt APF is validated through simulation using MATLAB/Simulink and experiment work by integrating the algorithm with DSPACE RS1104. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…This research was undertaken to develop methods to mitigate shoulder-surfing attack. Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method by Amusa, Morufu, Bamidele, Oluwade

    Published 2020
    “…The first authentication method is the Luhn checksum algorithm, otherwise called Luhn formula or mod 10 algorithm. …”
    Get full text
    Get full text
    Journal
  13. 13

    Rogue access point detection and tracking system using trilateration algorithm by Lee, Chiew Min, Ang, Boon Keat, Kok, Ser Leen, Ghali, Abdulrahman Aminu, Sabri, Nor ‘Afifah

    Published 2023
    “…Besides, that the project introduces a robust method called trilateration algorithm. Therefore, the proposed trilateration algorithm if implemented will detect and reduce the risk of unauthorized network access in tertiary institutions and save the danger of financial loss. …”
    Get full text
    Get full text
    Book Section
  14. 14

    Text messaging encryption system by Sundara Morthty, Nirmala Devi

    Published 2012
    “…The programming language that is used to write the program is Java Language.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    Graphical user interface for bounded-addition fuzzy splicing systems and their variants / Mathuri Selvarajoo ... [et al.] by Selvarajoo, Mathuri, Santono, Mohd Pawiro, Fong, Wan Heng, Sarmin, Nor Haniza

    Published 2023
    “…An algorithm is developed using JAVA and Visual Studio Code software in order to replace the time-consuming manual computation of the languages generated by bounded-addition fuzzy DNA splicing systems and their variants.…”
    Get full text
    Get full text
    Article
  16. 16

    Optimized processing of satellite signal via evolutionary search algorithm by Hassan, Azmi, Othman, Rusli, Tang, Kieh Ming

    Published 2000
    “…A combination of three methods, namely optimization, global random search and ambiguity function mapping has produced an efficient and robust mitigation technique. …”
    Get full text
    Get full text
    Article
  17. 17

    SIMULATION AND ANALYSIS OF HARMONIC DETECTION AND MITIGATION SYSTEM USING ACTIVE FILTER by MIZA, BELIA

    Published 2019
    “…In addition, this objective of this paper is to study of method of harmonics mitigation using the designed active filter to obtain better quality of signal in power system. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  18. 18

    Nonlinear adaptive algorithm for active noise control with loudspeaker nonlinearity by Dehkordi, Sepehr Ghasemi

    Published 2014
    “…Passive method involves the use of enclosures, barriers and silencers but is ineffective at low frequency noise (below 500Hz). …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20