Search Results - (( its application status algorithm ) OR ( some applications using algorithm ))*
Search alternatives:
- application status »
- applications using »
- some applications »
- status algorithm »
- its application »
- using algorithm »
-
1
Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System
Published 2010“…We design a service search algorithm for the RA that starts the service look up from the class of request origin first, then to the other classes. …”
Get full text
Get full text
Thesis -
2
Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System
Published 2010“…We design a service search I algorithm for the RA that starts the service look up from the class of request origin first, then to the other classes. …”
Get full text
Get full text
Thesis -
3
A study on classification learning algorithms to predict crime status.
Published 2013Get full text
Get full text
Article -
4
Bayesian network of influence of sociodemographic variables on dengue related knowledge, attitude, and practices in selected areas in Selangor, Malaysia
Published 2019“…The data collected was used to learn the structure of BN via some known algorithms using R programming language. …”
Get full text
Get full text
Thesis -
5
Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.]
Published 2021“…This project aims to produce a device that can be used to identify the current health status of a person using sensor and a data optimization algorithm. …”
Get full text
Get full text
Book Section -
6
-
7
A review of object detection in traffic scenes based on deep learning
Published 2024“…It systematically summarizes the Development and current research status of object detection algorithms, and compare the characteristics, advantages and disadvantages of the two types of algorithms. …”
Get full text
Get full text
Get full text
Article -
8
Validation of deep convolutional neural network for age estimation in children using mandibular premolars on digital panoramic dental imaging / Norhasmira Mohammad
Published 2022“…Traditionally, age estimation is dependent on radiographic examinations, and its application requires human competence. Demirjian's technique is one of the most frequently used methods to establish an individual's age. …”
Get full text
Get full text
Thesis -
9
A review of YOLO algorithm and its applications in autonomous driving object detection
Published 2025“…This paper reviews the YOLO algorithm and its application in object detection in autonomous driving scenarios. …”
Get full text
Get full text
Get full text
Article -
10
Reduced torque ripple and switching frequency using optimal DTC switching strategy for open-end winding induction machines
Published 2017“…The main benefit of the proposed strategy is its simplicity, where the DTC improvements can be obtained without the common approach, i.e. the use of Space Vector Modulation (SVM) which involves complex control algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
-
12
Suitability Factor on the Capacitated Vehicle Routing Problem
Published 2010Get full text
Get full text
Conference or Workshop Item -
13
Islamic media algorithms and halal perception in Malaysia
Published 2025Get full text
Get full text
Get full text
Article -
14
-
15
-
16
-
17
Three-term backpropagation algorithm for classification problem
Published 2006“…Standard Backpropagation Algorithm (BP) is a widely used algorithm in training Neural Network that is proven to be very successful in many diverse application. …”
Get full text
Get full text
Thesis -
18
-
19
VITILIGO LESION ASSESSMENT TOOL ON SMARTPHONE
Published 2013“…ICA algorithm does vast computations thus; ICA algorithm is used to improve segmentation performance. …”
Get full text
Get full text
Final Year Project -
20
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article
