Search Results - (( _ application tools algorithm ) OR ( its application ((need algorithm) OR (new algorithm)) ))*

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…In addition, with regard to the second algorithm SNBR, the results show that SNBR overcomes the NCPR algorithm terms of normalize routing overhead by 58.80% as its due to its dropping factor. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    Image steganography using web application / Nor Arzami Othman ... [et al.] by Othman, Nor Arzami, Shariffudin, Muhammad Nur Harith, Osman, Mohd Nizam, Sedek, Khairul Anwar

    Published 2023
    “…The web application proved to be a versatile and practical tool with applications in various fields such as cryptography and digital forensics. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A security payment model for financial payment using mykad by Ahmad Zahari, Nurul Huda

    Published 2011
    “…ARSA will automatically change its security algorithm based on times and attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Adaptive artificial neural network for power system security assessment and control action by Al-Masri, Ahmed Naufal A.

    Published 2012
    “…This study also investigates the reliability of ANN application in power system security assessment in terms of accuracy and computational time as well as developing a new method that can be included in security assessment tools. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    University class timetable tool by Ang, Wen Jie

    Published 2022
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Data prediction and recalculation of missing data in soft set / Muhammad Sadiq Khan by Muhammad Sadiq , Khan

    Published 2018
    “…Uncertain data cannot be processed by using the regular tools and techniques of clear data. Special techniques like fuzzy set, rough set, and soft set need to be utilized when dealing with uncertain data, and each special technique comes with its own advantages and snags. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Fast decryption method for a Rabin primitive-based cryptosystem by Asbullah, Muhammad Asyraf, Kamel Ariffin, Muhammad Rezal

    Published 2014
    “…The Chinese Remainder Theorem (CRT) is an algorithm for solving linear congruence system into a unique representation and has been a useful tool in applications of cryptography. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    Herb recognition for mobile apps / Jumriyanie Baba by Baba, Jumriyanie

    Published 2017
    “…The mobile application is able to recognize the herbs type using the most suitable algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20