Search Results - (( its application status algorithm ) OR ( some application using algorithmic ))*

Refine Results
  1. 1

    Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System by Hassan, Mahamat. I, Azween, Abdullah

    Published 2010
    “…We design a service search algorithm for the RA that starts the service look up from the class of request origin first, then to the other classes. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System by HASSAN, MAHAMAT ISSA

    Published 2010
    “…We design a service search I algorithm for the RA that starts the service look up from the class of request origin first, then to the other classes. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Bayesian network of influence of sociodemographic variables on dengue related knowledge, attitude, and practices in selected areas in Selangor, Malaysia by Ajibola, Lamidi-Sarumoh Alaba

    Published 2019
    “…The data collected was used to learn the structure of BN via some known algorithms using R programming language. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.] by Kushan, Albin Lemuel, Anuar, Muhammad Hazwan, Mohd Supir, Mohd Hafifi, Ahmad Fadzil, Ahmad Firdaus, Zolkeplay, Anwar Farhan

    Published 2021
    “…This project aims to produce a device that can be used to identify the current health status of a person using sensor and a data optimization algorithm. …”
    Get full text
    Get full text
    Book Section
  6. 6
  7. 7

    A review of object detection in traffic scenes based on deep learning by Zhao, Ruixin, Tang, SaiHong, Supeni, Eris Elianddy, Abdul Rahim, Sharafiz, Fan, Luxin

    Published 2024
    “…It systematically summarizes the Development and current research status of object detection algorithms, and compare the characteristics, advantages and disadvantages of the two types of algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Validation of deep convolutional neural network for age estimation in children using mandibular premolars on digital panoramic dental imaging / Norhasmira Mohammad by Mohammad, Norhasmira

    Published 2022
    “…Traditionally, age estimation is dependent on radiographic examinations, and its application requires human competence. Demirjian's technique is one of the most frequently used methods to establish an individual's age. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A review of YOLO algorithm and its applications in autonomous driving object detection by Wei, Jiapei, As'arry, Azizan, Md Rezali, Khairil Anas, Mohamed Yusoff, Mohd Zuhri, Ma, Haohao, Zhang, Kunlun

    Published 2025
    “…This paper reviews the YOLO algorithm and its application in object detection in autonomous driving scenarios. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Reduced torque ripple and switching frequency using optimal DTC switching strategy for open-end winding induction machines by Abd Rahim, Muhd Khairi

    Published 2017
    “…The main benefit of the proposed strategy is its simplicity, where the DTC improvements can be obtained without the common approach, i.e. the use of Space Vector Modulation (SVM) which involves complex control algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Three-term backpropagation algorithm for classification problem by Saman, Fadhlina Izzah

    Published 2006
    “…Standard Backpropagation Algorithm (BP) is a widely used algorithm in training Neural Network that is proven to be very successful in many diverse application. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    VITILIGO LESION ASSESSMENT TOOL ON SMARTPHONE by BORETSKAYA, VIKTORIYA

    Published 2013
    “…ICA algorithm does vast computations thus; ICA algorithm is used to improve segmentation performance. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article