Search Results - (( _ application tools algorithm ) OR ( its application ((need algorithm) OR (new algorithm)) ))*
Search alternatives:
- application tools »
- tools algorithm »
- need algorithm »
- new algorithm »
-
1
Synchronous gravitational search algorithm vs asynchronous gravitational search algorithm: a statistical analysis
Published 2014Get full text
Get full text
Conference or Workshop Item -
2
-
3
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
4
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…In addition, with regard to the second algorithm SNBR, the results show that SNBR overcomes the NCPR algorithm terms of normalize routing overhead by 58.80% as its due to its dropping factor. …”
Get full text
Get full text
Get full text
Thesis -
5
Shot boundary detection based on orthogonal polynomial
Published 2019Get full text
Get full text
Get full text
Article -
6
-
7
Image steganography using web application / Nor Arzami Othman ... [et al.]
Published 2023“…The web application proved to be a versatile and practical tool with applications in various fields such as cryptography and digital forensics. …”
Get full text
Get full text
Get full text
Article -
8
A security payment model for financial payment using mykad
Published 2011“…ARSA will automatically change its security algorithm based on times and attacks. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
10
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004Get full text
Get full text
Final Year Project -
11
Adaptive artificial neural network for power system security assessment and control action
Published 2012“…This study also investigates the reliability of ANN application in power system security assessment in terms of accuracy and computational time as well as developing a new method that can be included in security assessment tools. …”
Get full text
Get full text
Thesis -
12
Seismic attribute feasibility study for fault and fracture analysis and integration with spectral decomposition: Application in Sarawak basin
Published 2019Get full text
Get full text
Conference or Workshop Item -
13
University class timetable tool
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Data prediction and recalculation of missing data in soft set / Muhammad Sadiq Khan
Published 2018“…Uncertain data cannot be processed by using the regular tools and techniques of clear data. Special techniques like fuzzy set, rough set, and soft set need to be utilized when dealing with uncertain data, and each special technique comes with its own advantages and snags. …”
Get full text
Get full text
Get full text
Thesis -
15
Fast decryption method for a Rabin primitive-based cryptosystem
Published 2014“…The Chinese Remainder Theorem (CRT) is an algorithm for solving linear congruence system into a unique representation and has been a useful tool in applications of cryptography. …”
Get full text
Get full text
Get full text
Article -
16
-
17
-
18
Herb recognition for mobile apps / Jumriyanie Baba
Published 2017“…The mobile application is able to recognize the herbs type using the most suitable algorithm. …”
Get full text
Get full text
Thesis -
19
-
20
RISC-V instruction set extension on blockchain application
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis
