Search Results - (( based application tools algorithm ) OR ( its application towards algorithm ))*
Search alternatives:
- based application »
- application tools »
- towards algorithm »
- tools algorithm »
- its application »
-
1
RISC-V instruction set extension on blockchain application
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Restaurant locator using Djikstra Algorithm / Mohamad Aliff Hakimi Lukman Hakim
Published 2017“…This route-finding problem is one of the most important computer applications in the transportation industry. In network theory, it’s known as the shortest-path problem, and Dijkstra’s algorithm is usually used to solve it. …”
Get full text
Get full text
Thesis -
3
Entiment analysis of public perception on AI chatbots using Support Vector Machine (SVM) algoritm / Tuan Nur Azlina Tuan Ibrahim
Published 2024“…The research contributes a comprehensive exploration of sentiment analysis, combining technical expertise with societal insights. The SVM-based sentiment analyzer offers a user-friendly tool bridging complex algorithms and practical applications. …”
Get full text
Get full text
Thesis -
4
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
5
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Development of a computer vision-based technique for analysis of hand therapy exercise
Published 2018“…Hand therapy exercises based on computer vision system have many benefits and this has attracted the interest of researchers towards building a computer vision application. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
Towards a unified image quality assessment technique for cross-content image processing applications
Published 2024“…It can reconstruct images with five distortion types, outperforming SOTA AS algorithms, even under high distortion. The first stage uses an application-specific reconstruction algorithm, while the second stage employs an IQA-based model called the observation-based bilateral filter (OBF) with non-linear weights calculated using a Haar-PSI-based maximum a posteriori (MAP) estimator. …”
Get full text
Thesis -
9
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
10
-
11
Toward Quantum-Resilient PKI: A Systematic Literature Review of Post-Quantum Certificates Model
Published 2026journal::journal article -
12
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Evaluation of cloud 3D printing services oriented toward the product life cycle based on a triangular fuzzy number complementary judgment matrix
Published 2024“…As a result, the need for cloud-based 3D printing services has increased significantly. …”
Get full text
Get full text
Get full text
Article -
15
E4ML: Educational Tool for Machine Learning
Published 2003Get full text
Get full text
Conference or Workshop Item -
16
Image orientation watermarking technique for copyright protection
Published 2016“…This copy is meant to prevent any deliberate or unintentional attempt to remove the signature from its content. In return, a copyright gains its validity based on such robust characteristics. …”
Get full text
Get full text
Get full text
Thesis -
17
Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan
Published 2019“…Which is why this project objective is to develop a web based clustering tool using K-MEAN++ algorithm. This project will use the rapid application development (RAD) methodology since this are the most suitable method for developing the system. …”
Get full text
Get full text
Thesis -
18
A genetic similarity algorithm for searching the Gene Ontology terms and annotating anonymous protein sequences
Published 2008“…To show the applicability of the basic UTMGO, we extend its structure to develop a Gene Ontology -based protein sequence annotation tool named extended UTMGO. …”
Get full text
Get full text
Get full text
Article -
19
Digital Transformation Using Industry 4.0 and Artificial Intelligence
Published 2025“…Explainable artificial intelligence (XAI) conducts studies and creates tools, techniques, and algorithm designs that produce information and judgments made by AI-based systems that are comprehensible to humans. …”
Book chapter -
20
