Search Results - (( its application service algorithm ) OR ( _ application means algorithm ))*

Refine Results
  1. 1

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari by Nazari, Khairul Nashran

    Published 2017
    “…AES is being used widely in many applications since it is known for its faster encryption and decryption process and its strength. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Enhancing Solutions Of Capacity Vehicle Routing Problem Based On An Improvement Ant Colony System Algorithm by Mutar, Modhi Lafta, Mohd Aboobaider, Burhanuddin, Hameed, Asaad Shakir, Yusof, Norzihani

    Published 2019
    “…It serves an important task in logistics and supply procession administration appropriate toward its wide applications in transport, product delivery, and services. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    Intent-IQ: customer’s reviews intent recognition using random forest algorithm by Mazlan, Nur Farahnisrin, Ibrahim Teo, Noor Hasimah

    Published 2025
    “…The future recommendation for this project is to build a classification model for Malay reviews and explore other algorithms which could gain better accuracy by capturing more contextual meanings in the reviews such as BERT.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks by Mubarak, Mohammed Awadh Ahmed Ben

    Published 2013
    “…Also, it is shown that FuzSAHO enhances the overall handover operation in term of reduced overhead signalling, average E2E packet delay and satisfactory CINR which satisfies network end user requirements. For real-time applications, simulation results show that RFuzSAHO decision algorithm enhances the VoIP quality (Mean Opinion Score, MOS) up to 5.4% compared to FuzSAHO algorithm when the MS velocity is 20m/s.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Development of an accurate AI-based dermatology assistant for skin disease recognition using YOLOv8 models by Huzaini, Muhammad Irfan Darwish, Mansor, Hasmah, Gunawan, Teddy Surya, Ahmad, Izanoordina

    Published 2024
    “…The research compares various algorithms, such as SVM, YOLOv3, YOLOv4, and Dual-Architecture CNN, through a comprehensive review of existing AI applications in dermatology. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System by Hassan, Mahamat. I, Azween, Abdullah

    Published 2010
    “…RD is about locating an appropriate resource/service type that matches the user’s application requirements. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System by HASSAN, MAHAMAT ISSA

    Published 2010
    “…RD is about locating an appropriate resource/service type that matches the user's application requirements. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Efficient Discovery Protocol for Ubiquitous Communication in Wireless Environment by Zarrin, Javad

    Published 2009
    “…So, there are a lot of ways to develop and employ applications in such environment as infrastructure, but the most effective and general one is using service advertisements, service discovery and service remote invocation. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    CYCLOSTATIONARY FEATURES OF PAL TV AND WIRELESS MICROPHONE FOR COGNITIVE RADIO APPLICATIONS by ALHASSAN MOSSA, ALFATEH MOHAMMED

    Published 2010
    “…In order to do so, we develop the co-existence scenario with three cases according to geographical positions of primary services and secondary service. In WRAN application, the SUs utilize the unused channel in TV spectrum, which means that the primary users are TV service and other FCC part 74 low power licensed devices. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Backhaul load and performance optimality of partial joint processing schemes in LTE-A networks by Kousha, Mohammad

    Published 2014
    “…The utility of PJP schemes for three different traffic types shows that DPS is preferred over JT for elastic and adaptive applications. The significance of the proposed algorithm is also proven in comparison with previous approach by maintaining the same performance while reducing the backhaul load up to 30%. …”
    Get full text
    Get full text
    Thesis
  16. 16

    End-to-end DVB-S2X system design with deep learning-based channel estimation over satellite fading channels by Mfarej, Sumaya Dhari Awad

    Published 2021
    “…Although the conventional algorithm, MMSE, outperforms the pro�posed algorithms when the number of pilots increased but it is not applicable in real transmission as it is required prior knowledge about the channel statistic which is not the case with DL-based estimators which rely only on the pilots. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19
  20. 20