Search Results - (( _ application drops algorithm ) OR ( some applications matching algorithm ))*

Refine Results
  1. 1
  2. 2

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. The results of False Matching Ratio (FMR) was 16.67% whilst the False Non-Matching Ratio (FNMR) was 33.33%. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

    Web application vulnerabilities detection model by Buja, Alya Geogiana, Abd. Jalil, Kamarularifin, Mohd Ali, Fakariah, Abdul Rahman, Teh Faradilla

    Published 2016
    “…The algorithm is used in order to match the defined criteria of each web vulnerability with the input information about web application. …”
    Get full text
    Get full text
    Research Reports
  8. 8

    Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman by Azman, Muhammad Izzat Azri

    Published 2017
    “…There are two main processes involved in ABC Algorithm which are exploration and exploitation. In the exploration process, the algorithm will search for a population of house that matches with home buyers’ financial availability. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11
  12. 12

    Detection and Recognition of Broken Character in Car Plate Image by Abd Halim, Suhaila, Zulkifli, Mohd Syazreen

    Published 2020
    “…Therefore, this study is concerned to develop a tool with recognition algorithm that able to detect the broken character on car plate by using Template Matching. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    DC-based PV-powered home energy system by Sabry, Ahmad H.

    Published 2017
    “…The work initially investigates the feasibility of using the DC distribution system to power the locally available AC appliances, that are analyzed and evaluated individually to match the DC supply either by direct coupling or some modification. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…In addition, with regard to the second algorithm SNBR, the results show that SNBR overcomes the NCPR algorithm terms of normalize routing overhead by 58.80% as its due to its dropping factor. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19
  20. 20