Search Results - (( variable create _ algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    ENGINEERING DESIGN WITH PSO ALGORITHM by MHD BASIR, SITI NUR HAJAR

    Published 2019
    “…Creating a PSO algorithm-based infrastructure integrating with the recommendation system will further enhance solution to the design problem. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  4. 4

    To study the multi-objective optimization of EDM using genetic algorithm by Fairuz, Idris

    Published 2013
    “…In the process of the study, the second- order mathematical model has been create as a fitness function using MATLAB software to generate multi-objective optimization responses using Genetic Algorithms, peak current, pulse-on time, pulse-off time and servo voltage are act as input of parameter setting. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…Approach: Dynamic and message dependent key generator was created by producing a random number and it was selected as the size of first chunk. …”
    Get full text
    Get full text
    Article
  6. 6

    Development of genetic algorithm for optimization of yield models in oil palm production by Hilal, Yousif Y., Wan Ismail, Wan Ishak, Yahya, Azmi, Ash’aari, Zulfa Hanan

    Published 2018
    “…Nonetheless, the advance in computer technology has created a new opportunity for the study of modelling as selecting variables intended to choose the “best” subset of predictors. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Enhancing Model Selection Based On Penalized Regression Methods And Empirical Mode Decomposition by Al Jawarneh, Abdullah Suleiman Saleh

    Published 2021
    “…These components have been used in several studies as new predictor variables to predict the behaviour of the response variable. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Observer-based fault detection with fuzzy variable gains and its application to industrial servo system by Eissa, Magdy Abdullah, Sali, Aduwati, Hassan, Mohd Khair, Bassiuny, A. M., Darwish, Rania R.

    Published 2020
    “…Also, a scoring algorithm has been implemented, to evaluate the classification ability of the algorithm and the early fault detection ability. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    A PI based coordinated maximum power point tracking controller for grid connected photovoltaic system / Md Haidar Islam by Md Haidar, Islam

    Published 2021
    “…MATLAB Simulink tool box is used to create models to carry out performance evaluation of a PV module with the MPPT algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Neutralisation state driven single-agent search strategy for solving constraint satisfaction problem / Saajid Akram Ahmed Abuluaih by Ahmed Abuluaih, Saajid Akram

    Published 2019
    “…Since Constraint Satisfaction Problem (CSP) is an NP-complete problem, brute-force search algorithms such as Backtracking algorithm (BT) are required as the guarantee to find a solution, when there is one. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Optimal Long-Term Hydro Generation Scheduling of Small Hydropower Plant (SHP) using Metaheuristic Algorithm in Himreen Lake Dam by Hammid, Ali Thaeer, M. H., Sulaiman

    Published 2017
    “…The results obtained from these two methods, namely Firefly Algorithm (FA) and Particle Swarm Optimization, (PSO) are compared. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Cryptanalysis of elliptic curve scalar multiplication algorithms by Leong, Zhen Hong

    Published 2025
    “…This creates challenges in developing secure Elliptic Curve Cryptography systems and performing cryptanalysis for scalar multiplication algorithms. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Cryptanalysis of elliptic curve scalar multiplication algorithms by Leong, Zhen Hong

    Published 2025
    “…This creates challenges in developing secure Elliptic Curve Cryptography systems and performing cryptanalysis for scalar multiplication algorithms. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Test of Self Por [decoded] trait no. 2 / Syafiq Abdul Samat by Abdul Samat, Syafiq

    Published 2021
    “…Inspired by some of the generative art made via programming, I was able to create my own algorithmic concept, using these “noises” as factors or variables to affect the creation of the proposed visual. …”
    Get full text
    Get full text
    Book Section
  17. 17

    Optimum Power Production of Small Hydropower Plant (SHP) Using Firefly Algorithm (FA) in Himreen Lake Dam (HLD), Eastern Iraq by Hammid, Ali Thaeer, M. H., Sulaiman, Kadhim, Atheer A.

    Published 2017
    “…The results obtained from these two methods, namely Firefly Algorithm (FA) and Particle Swarm Optimization, (PSO) are compared. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Cryptanalysis of elliptic curve scalar multiplication algorithms by Leong, Zhen Hong

    Published 2025
    “…This creates challenges in developing secure Elliptic Curve Cryptography systems and performing cryptanalysis for scalar multiplication algorithms. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Forecast the road accidents in Malaysia using exponential smoothing and multiple linear regression modelling / Nor Salam Abdul Manaf by Abdul Manaf, Nor Salam

    Published 2023
    “…In Malaysia, traffic accidents are a significant public health issue, and the government is continuously seeking for measures to prevent them. Creating precise forecasting algorithms that can anticipate future traffic accidents is one method to do this. …”
    Get full text
    Get full text
    Thesis