Search Results - see ((new algorithm) OR (based algorithm))

Refine Results
  1. 1

    Steganography algorithm to hide secret message inside an image by Ibrahim, Rosziati, Teoh, Suk Kuan

    Published 2011
    “…Hence this new steganography algorithm is very efficient to hide the data inside the image.…”
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Photovoltaic System with INC MPPT Algorithm in MATLAB Simulink by F.Z. Hamidon, Nor Shafiqin, P.D. Abd. Aziz, N.H. Mohd Yunus, UniKL BMI

    Published 2013
    “…Simulation results show that the MPPT with INC algorithm offers the best performance in terms of its fastest response in tracking new MPP and highest efficiency under rapid change of irradiance level.…”
  5. 5

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A performance improvement of Domosi’s cryptosystem by Khaleel, Ghassan, Turaev, Sherzod, Mohd Tamrin, Mohd Izzuddin, Alshaikhli, Imad Fakhri Taha

    Published 2015
    “…Though this cryptosystem has been proven to be secure against different standard attacks (see [8]), the proposed encryption algorithms in [2, 3] involve exhaustive backtracking in order to generate ciphertexts. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    A performance improvement of Dömösi’s cryptosystem by Khaleel, Ghassan, Turaev, Sherzod, Mohd. Tamrin, Mohd. Izzuddin, Alshaikhli, Imad Fakhri Taha

    Published 2016
    “…Though this cryptosystem has been proven to be secure against different standard attacks (see [8]), the proposed encryption algorithms in [2, 3] involve exhaustive backtracking in order to generate ciphertexts. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Identification of continuous-time model of hammerstein system using modified multi-verse optimizer by Most. Julakha, Jahan Jui

    Published 2021
    “…The statistical analysis value (mean) was taken from the parameter deviation index to see how much our proposed algorithm has improved. …”
    Get full text
    Get full text
    Thesis
  9. 9

    User interface and interactivity design guidelines of algorithm visualization on mobile platform by Supli, Ahmad Affandi

    Published 2019
    “…Algorithm Visualization (AV) is a pedagogical tool that can help learners to see the animation of the step-by-step process of an algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Crossover and mutation operators of real coded genetic algorithms for global optimization problems by Lim, Siew Mooi

    Published 2016
    “…This research employed a new generational GA based on a combination of the proposed Rayleigh Crossover (RX) and proposed Scale Truncated Pareto Mutation (STPM) called RX-STPM. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Cognitive selection mechanism performance in IEEE 802.11 WLAN by Hashim, Wahidah, Ismail, Ahmad Fadzil, Ghafar, Nadratul, Dzulkifly, Sumayyah

    Published 2013
    “…The results for the selection were evaluated respectively to see the variation in selection pattern when compared to the default selection algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Conceptual deployment models to secure cloud computing / Hajar Ziglari by Ziglari, Hajar

    Published 2012
    “…Cloud computing is a choice of raising the capacity or adding extra capabilities with no new infrastructure investment to train new personnel, or get licence for new software. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Modeling and design control strategy for unwind/rewind system by Ismail, Muhamad Fahezal

    Published 2008
    “…This project was replaced the PLC to computer controlled method. A new control algorithm that based on the regulator feedback was proposed. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Securing graphical user password using multi-grid technique from shoulder surfing attack / Leila Ghasemi Sabet by Sabet, Leila Ghasemi

    Published 2010
    “…Based on previous researches in the graphical password techniques especially recall-based techniques we had some problems from security point of view. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Shape-Based Matching: Application of Edge Detection using Harris Point by Harun, Mohamad Haniff, Sulaiman , Marizan, Mohd Shah, Hairol Nizam

    Published 2011
    “…This paper presents a sequence of object recognition algorithm using shape-based matching that mainly focused on image recognition, image segmentation, and flexible Region of Interest. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Performance and security improvements of Dӧmӧsi’s cryptosystem by Khaleel, Ghassan, Turaev, Sherzod, Mohd Tamrin, Mohd Izzuddin, Alshaikhli, Imad Fakhri Taha

    Published 2016
    “…Dӧmӧsi’s cryptosystem (Dӧmӧsi’s, 2008; Dӧmӧsi, November 11–14, 2009) is a new stream cipher based on finite automata without outputs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20