Search Results - (( _ application using algorithm ) OR ( things applications out algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…This research implements the SHA-3 in ways such that all the step mapping algorithms are logically combined to only use the input lanes of the state array to eliminate the intermediate logics and reduces the area size. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Enhancement of rules-application-order (RAO) stemming algorithm based on the first character of Malay word / Edatul Muliana Ghazalli by Ghazalli, Edatul Muliana

    Published 2005
    “…The resuhs of experiment B, which is enhance project is better than experiment A, which is Rules-Application-Order (RAO) by Fatimah (1995) because that algorithm has successfully stemmed all word begin with alphabet "A" until "Z" that extracted fi-om Quran documents.…”
    Get full text
    Get full text
    Thesis
  6. 6

    Obstacle Detection And Avoidance System by Yew, Chang Chern

    Published 2018
    “…Current technology trend is moving towards automation and people need things to be done automatically. The obstacle detection and avoidance system is being researched to study its application in automated machine. …”
    Get full text
    Get full text
    Monograph
  7. 7

    Applying SAX-based time series analysis to classify EEG signal using a COTS EEG device by Shanmuga, Pillai A/L Murutha Muthu

    Published 2021
    “…This research will investigate the application of the Symbolic Aggregate Approximation (SAX) algorithm on top of known supervised machine learning techniques to perform EEG signal classification. …”
    Get full text
    Thesis
  8. 8
  9. 9

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…It is also not known how the algorithm would perform against the widely used RSA on resource-constrained platforms. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An intelligent DDoS attack detection tree-based model using Gini index feature selection method by Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik, Atigh, Hayate El

    Published 2023
    “…Our approach is, therefore, highly effective and efficient, with the potential to be used in real-world network security applications.…”
    Get full text
    Get full text
    Article
  11. 11

    Intuitive content management system via manipulation and duplication with if-else rules classification by Chan, Chung Hoong

    Published 2018
    “…An ICMS is a content management system that uses three main important techniques to build, such as Manipulation method, Data Mining Prediction, and Boyer-Moore Horspool algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Multi-objective flow measurement in software defined networks (SDN) for datacenter / Hamid Tahaei by Hamid , Tahaei

    Published 2018
    “…Network traffic is growing exponentially due to the ever-increasing number of users, datacentres, Internet of Things (IoT) devices, and cloud-like applications/services. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Robust multi-gateway authentication scheme for agriculture wireless sensor network in society 5.0 smart communities by Khalid, Haqi, Hashim, Shaiful Jahari, Syed Ahmad, Sharifah Mumtazah, Hashim, Fazirulhisyam, Chaudhary, Muhammad Akmal

    Published 2021
    “…This work proposes a new authentication scheme for agriculture professionals based on a multi-gateway communication model using a fuzzy extractor algorithm to support the Society 5.0 environment. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Design and analysis of microstrip antenna using negative index metamaterial approach by Alhawari, Adam Reda Hasan

    Published 2012
    “…Parameters retrieval algorithm and full-wave simulation of prism-shaped structure were carried out to validate the negative index of refraction property of the proposed NIM structures. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Hybrid metaheuristics for QOS-aware service composition / Hadi Naghavipour by Hadi , Naghavipour

    Published 2022
    “…An absolute majority of base algorithms for this problem were nature-inspired and population-based metaheuristics extended to complementary methods in hybrid solutions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Schelkunoff array synthesis methods using adaptive-iterative algorithm by Abdul Latiff, Nurul Mu'azzah

    Published 2003
    “…By the co-emergence of these algorithms, a better performance and wider application are hoped to be achieved since each of these algorithms has its own advantages respectively. …”
    Get full text
    Get full text
    Get full text
    Thesis