Search Results - (( using simulation techniques algorithm ) OR ( java identification using algorithm ))

Refine Results
  1. 1

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti by Abdul Shauti, Noor Azliza

    Published 2008
    “…By using this identification, it can simulate in flexible images post processing and analysis in easy image management using Java aplication. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Face recognition and identification system (FaceRec) / Khew Jye Huei by Khew , Jye Huei

    Published 2004
    “…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…The proposed protocol using 64 bits index is proved having the lowest non-unequivocally identification probability. …”
    Get full text
    Get full text
    Thesis
  7. 7

    An expanded square pattern technique in swarm of quadcopters for exploration algorithm by Zuhri, Muhammad Fuad Reza, Ismail, Amelia Ritahani

    Published 2017
    “…We simulate the swarm-based exploration algorithm with expanded square pattern using a VREP simulator. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Simulation of fast recursive least square algorithm for echo cancellation system by Kamaruddin, Rosita

    Published 2003
    “…There are numerous techniques utilized for echo cancellation. The current trend is using digital signal processing techniques. …”
    Get full text
    Get full text
    Student Project
  9. 9

    IMPLEMENTATION OF NOISE CANCELLATION WITH HARDWARE DESCRIPTION LANGUAGE by SUN, LEE KUANG

    Published 2006
    “…The performance of several adaptive algorithms is compared to determine the desirable algorithm used for adaptive noise cancellation system. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    A meta-heuristics based input variable selection technique for hybrid electrical energy demand prediction models by ul Islam, B., Baharudin, Z.

    Published 2017
    “…The combined influence of the genetic algorithm and correlation analysis are used in this technique. …”
    Get full text
    Get full text
    Article
  11. 11

    Modelling and simulation of hysteresis control algorithm for use in single phase ac-to-ac matrix converter / Seri Iryani Mohd Noor by Mohd Noor, Seri Iryani

    Published 2003
    “…This thesis is illustrated by developing computer simulation models of ac-to-ac single phase matrix converter (SPMC) using sinusoidal pulse width modulation (SPWM) technique and another algorithm i.e hysteresis control technique. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A New Hybrid Image Encryption Technique Using Lorenz Chaotic System and Simulated Kalman Filter (SKF) Algorithm by Nurnajmin Qasrina Ann, ., Pebrianti, Dwi, Mohammad Fadhil, Abas, Bayuaji, Luhur

    Published 2022
    “…Nowadays, encryption is one of the most popular and effective security methods used by company and organizations. A new hybrid technique, Lorenz chaotic system and an optimization algorithm, Simulated Kalman Filter (SKF) had been proposed to solve image encryption problem. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm by Muhammad Syahril Mohamad Sainal

    Published 2022
    “…Furthermore, CloudSim simulator will be used to evaluate the performance of this algorithm. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  14. 14
  15. 15

    Distance approximation using pivot point in narrow phase collision detection by Sulaiman, Hamzah Asyrani, Bade, Abdullah, Abdullah, Mohd Harun

    Published 2013
    “…Most computer games and simulation maintain speed as the main important elements while others such as medical and mechanical simulation needs to have a very high precision collision detection technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    OPTIMAL DESIGN AND ANALYSIS OF A DC–DC SYNCHRONOUS CONVERTER USING GENETIC ALGORITHM AND SIMULATED ANNEALING by K., S. Rama Rao., C. , -K, Chew

    Published 2009
    “…Abstract This paper presents the application of Genetic Algorithm (GA) and Simulated Annealing (SA) techniques for optimal design and analysis of a DC–DC converter with synchronous rectification normally used in battery charge/discharge circuits in DC uninterruptible power supply systems. …”
    Get full text
    Get full text
    Citation Index Journal
  17. 17

    OPTIMAL DESIGN AND ANALYSIS OF A DC–DC SYNCHRONOUS CONVERTER USING GENETIC ALGORITHM AND SIMULATED ANNEALING by K.S., Rama Rao, C. K., Chew

    Published 2009
    “…This paper presents the application of Genetic Algorithm (GA) and Simulated Annealing (SA) techniques for optimal design and analysis of a DC–DC converter with synchronous rectification normally used in battery charge/discharge circuits in DC uninterruptible power supply systems. …”
    Get full text
    Get full text
    Citation Index Journal
  18. 18

    Optimized clustering with modified K-means algorithm by Alibuhtto, Mohamed Cassim

    Published 2021
    “…Among the techniques, the k-means algorithm is the most commonly used technique for determining optimal number of clusters (k). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Optimal input shaping for vibration control of a flexible manipulator using genetic algorithm by Rudrusamy, Bhuvendra

    Published 2005
    “…This thesis presents optimization of input shaping technique for vibration control of a flexible robot manipulator using genetic algorithms (GA). …”
    Get full text
    Get full text
    Thesis
  20. 20