Search Results - (( variable generation matching algorithm ) OR ( java application force algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…Results: Attack on the key generation process was prevented because of random key generation and its dependency to input message. …”
    Get full text
    Get full text
    Article
  2. 2

    Hybrid dynamic scheduling model for flexible manufacturing system with machine availability and new job arrivals by Paslar, Shahla

    Published 2015
    “…Subsequently, a novel approach that combines the hybrid rescheduling strategy with an initial robust schedule which is generated using random fuzzy variables is presented. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter by Taghvaee, Mohammad Hossein

    Published 2013
    “…Its weaknesses, however, are its variable generation and non-linear characteristic due to its intermittent nature. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  5. 5

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Copy number variations of Orang Asli’ (Negrito) from Peninsular Malaysia / Siti Shuhada Mokhtar by Mokhtar, Siti Shuhada

    Published 2015
    “…CNVs were then called by two independent algorithms namely, Genotyping Console and Nexus CNV. …”
    Get full text
    Get full text
    Thesis
  7. 7

    LINGUISTIC FUZZY MODELING IN LASER MACHINING QUALITY EVALUATION by Sivarao, Subramonian

    Published 2007
    “…In this research, the inputs are the key variables of the design parameters which generates the singleton output to evaluate the cut edge quality in laser machining. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Modelling and control strategies for hydrokinetic energy harnessing by Wan Ismail, Ibrahim

    Published 2020
    “…Subsequently, the metaheuristic method based on the combination of the Hill-Climbing Search (HCS) MPPT algorithm and the Fuzzy Logic Controller has been proposed to produce a variable step size compared to the fixed step size in conventional HCS algorithm. …”
    Get full text
    Get full text
    Thesis