Search Results - (( using simulation technique algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  4. 4

    An expanded square pattern technique in swarm of quadcopters for exploration algorithm by Zuhri, Muhammad Fuad Reza, Ismail, Amelia Ritahani

    Published 2017
    “…We simulate the swarm-based exploration algorithm with expanded square pattern using a VREP simulator. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Simulation of fast recursive least square algorithm for echo cancellation system by Kamaruddin, Rosita

    Published 2003
    “…There are numerous techniques utilized for echo cancellation. The current trend is using digital signal processing techniques. …”
    Get full text
    Get full text
    Student Project
  6. 6

    IMPLEMENTATION OF NOISE CANCELLATION WITH HARDWARE DESCRIPTION LANGUAGE by SUN, LEE KUANG

    Published 2006
    “…The performance of several adaptive algorithms is compared to determine the desirable algorithm used for adaptive noise cancellation system. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    A meta-heuristics based input variable selection technique for hybrid electrical energy demand prediction models by ul Islam, B., Baharudin, Z.

    Published 2017
    “…The combined influence of the genetic algorithm and correlation analysis are used in this technique. …”
    Get full text
    Get full text
    Article
  8. 8

    Modelling and simulation of hysteresis control algorithm for use in single phase ac-to-ac matrix converter / Seri Iryani Mohd Noor by Mohd Noor, Seri Iryani

    Published 2003
    “…This thesis is illustrated by developing computer simulation models of ac-to-ac single phase matrix converter (SPMC) using sinusoidal pulse width modulation (SPWM) technique and another algorithm i.e hysteresis control technique. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A New Hybrid Image Encryption Technique Using Lorenz Chaotic System and Simulated Kalman Filter (SKF) Algorithm by Nurnajmin Qasrina Ann, ., Pebrianti, Dwi, Mohammad Fadhil, Abas, Bayuaji, Luhur

    Published 2022
    “…Nowadays, encryption is one of the most popular and effective security methods used by company and organizations. A new hybrid technique, Lorenz chaotic system and an optimization algorithm, Simulated Kalman Filter (SKF) had been proposed to solve image encryption problem. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm by Muhammad Syahril Mohamad Sainal

    Published 2022
    “…Furthermore, CloudSim simulator will be used to evaluate the performance of this algorithm. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  11. 11
  12. 12
  13. 13

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Distance approximation using pivot point in narrow phase collision detection by Sulaiman, Hamzah Asyrani, Bade, Abdullah, Abdullah, Mohd Harun

    Published 2013
    “…Most computer games and simulation maintain speed as the main important elements while others such as medical and mechanical simulation needs to have a very high precision collision detection technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    OPTIMAL DESIGN AND ANALYSIS OF A DC–DC SYNCHRONOUS CONVERTER USING GENETIC ALGORITHM AND SIMULATED ANNEALING by K., S. Rama Rao., C. , -K, Chew

    Published 2009
    “…Abstract This paper presents the application of Genetic Algorithm (GA) and Simulated Annealing (SA) techniques for optimal design and analysis of a DC–DC converter with synchronous rectification normally used in battery charge/discharge circuits in DC uninterruptible power supply systems. …”
    Get full text
    Get full text
    Citation Index Journal
  16. 16

    OPTIMAL DESIGN AND ANALYSIS OF A DC–DC SYNCHRONOUS CONVERTER USING GENETIC ALGORITHM AND SIMULATED ANNEALING by K.S., Rama Rao, C. K., Chew

    Published 2009
    “…This paper presents the application of Genetic Algorithm (GA) and Simulated Annealing (SA) techniques for optimal design and analysis of a DC–DC converter with synchronous rectification normally used in battery charge/discharge circuits in DC uninterruptible power supply systems. …”
    Get full text
    Get full text
    Citation Index Journal
  17. 17

    Optimized clustering with modified K-means algorithm by Alibuhtto, Mohamed Cassim

    Published 2021
    “…Among the techniques, the k-means algorithm is the most commonly used technique for determining optimal number of clusters (k). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Optimal input shaping for vibration control of a flexible manipulator using genetic algorithm by Rudrusamy, Bhuvendra

    Published 2005
    “…This thesis presents optimization of input shaping technique for vibration control of a flexible robot manipulator using genetic algorithms (GA). …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis