Search Results - (( using sector role algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- role algorithm »
- using sector »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
2
Efficient energy Management in Industrial Sector
Published 2019“… This paper presents the efficient in energy management in Malaysia Industrial Sector. Efficient in energy management plays a vital role in order to accommodate need of energy in the future, to conserve, preserve the resources for future generation. …”
Get full text
Get full text
Final Year Project -
3
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Al...
Published 2024“…The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. …”
Get full text
Get full text
Get full text
Book Chapter -
5
-
6
Cluster detection for spatio-temporal dengue cases at Selangor districts using multi-EigenSpot algorithm
Published 2022“…The algorithm was deployed to the datasets using MATLAB software. …”
Get full text
Get full text
Conference or Workshop Item -
7
Optimization of exclusive release policies for hydropower reservoir operation by using genetic algorithm
Published 2016“…The efficient utilization of hydropower resources play an important role in the economic sector of power systems, where the hydroelectric plants constitute a significant portion of the installed capacity. …”
Get full text
Get full text
Get full text
Article -
8
A hybrid of Simple Constrained artificial bee colony algorithm and flux balance analysis for enhancing Lactate and Succinate in Escherichia Coli
Published 2018“…The hybrid algorithm employed the Simple Constrained Artificial Bee Colony (SCABC) algorithm, using swarm intelligence as an optimization algorithm to optimize the objective function, where lactate and succinate productions are maximized by simulating gene knockout in E. coli. …”
Get full text
Get full text
Get full text
Get full text
Book Chapter -
9
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Examining leadership style and ethical reasoning in Nigeria public sector
Published 2016“…Partial Least Squares Method (PLS) algorithm was used for testing of the study‘s hypotheses. …”
Get full text
Get full text
Get full text
Thesis -
11
'Chapter 10: 5G-enabled IoT applications in healthcare: Transforming the Industry 5.0 healthcare landscape' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 T...
Published 2024“…The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. …”
Get full text
Get full text
Get full text
Book Chapter -
12
Forensic accountants, auditors and fraud capability and competence requirements in the Nigerian public sector
Published 2014“…The ten out of fifteen hypotheses were tested through the use of PLS-SEM algorithm and bootstrap techniques on the hypothesized relationships while the remaining five hypotheses of differences among groups were tested using the Mann-Whitney U Test. …”
Get full text
Get full text
Get full text
Thesis -
13
Secured electrocardiograph (ECG) signal using fully homomorphic encryption technique
Published 2020“…The proposed encryption scheme FHE is performed on the encrypted ECG data where FHE can be applied in any system by using a various public key algorithm. The secured ECG transmission system will work on the fourth industrial revolution with four major themes: speed of care, ability to manage illness, the role of patient and the relationship between healthcare and service provider. …”
Get full text
Get full text
Article -
14
Vehicle routing problem: models and solutions
Published 2008“…Recently many exact methods have been used to solve the VRP such as exact algorithms based on linear programming techniques and guided local search. …”
Get full text
Get full text
Get full text
Article -
15
The effectiveness of energy management system on energy efficiency in the building
Published 2017“…Higher Education sector of any country plays a pivotal role in national development.If such a key sector is weak, there is every likelihood that research, development and innovation will be week.The purpose of this study was to examine the effects of quality culture on university performance.The hypothesis was developed based on the extant literature. …”
Get full text
Get full text
Get full text
Article -
16
Comparison between pixel-based and object based classifications using radar satellite image in extracting massive flood extent at northern region of Peninsular Malaysia
Published 2015“…TerraSAR-X image was used to map the flood extent of the study area. In object-based approach, there were three simple machine learning algorithms such as PP, MD, MH together with NN performed with high accuracy while in pixel based approach, NN was the highest accuracy of all machine learning algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
17
Comparison between pixel-based and object-based classifications using radar satellite image in extracting massive flood extent at northern region of Peninsular Malaysia
Published 2015“…TerraSAR-X image was used to map the flood extent of the study area. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
A systematic and critical review on effective utilization of artificial intelligence for bio-diesel production techniques
Published 2023“…Therefore, in this paper, we cover a new advancement in techniques used for the conversion of oil/fat to biodiesel and the role of artificial intelligence (AI). …”
Get full text
Get full text
Article -
19
Clustering Based on Customers’ Behaviour in Accepting Personal Loan using Unsupervised Machine Learning
Published 2023“…As a conclusion, KMeans clustering was presenting better cluster results using this particular dataset.…”
Get full text
Get full text
Get full text
Get full text
Article -
20
OFF-GRID SOLAR PHOTOVOLTAIC (PV) DESIGN BASED ON FUZZY TECHNIQUE FOR ORDER PERFORMANCE BY SIMILARITY TO IDEAL SOLUTION (TOPSIS) APPROACH
Published 2022“…The aforementioned technique is the MCDM method, particularly the fuzzy TOPSIS algorithm. This algorithm is embedded in the PV system to select the best PV components’ configuration based on multiple criteria. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD
