Search Results - (( its application system algorithm ) OR ( some applications using algorithm ))*

Refine Results
  1. 1

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    A block-based multi-scale background extraction algorithm by Davarpanah, Seyed Hashem, Khalid, Fatimah, Golchin, Maryam

    Published 2010
    “…Conclusion: Using Multi scaling filtering and applying the filters just to some selected nonoverlapped blocks reduce the time consumption of the extracting background algorithm. …”
    Get full text
    Get full text
    Article
  3. 3

    Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin by Shamsudin, Farah Syadiyah

    Published 2017
    “…Fingerprint verification has drawn a lot of attention on its approach in biometric since it is one of the most important biometric technologies nowadays and it is widely used in several different applications and areas. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Three-term backpropagation algorithm for classification problem by Saman, Fadhlina Izzah

    Published 2006
    “…Standard Backpropagation Algorithm (BP) is a widely used algorithm in training Neural Network that is proven to be very successful in many diverse application. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Two objectives big data task scheduling using swarm intelligence in cloud computing by Diallo, Laouratou, Hassan Abdalla Hashim, Aisha, Olanrewaju, Rashidah Funke, Islam, Shayla, Zarir, Abdullah Ahmad

    Published 2016
    “…It has been widely used for its enormous benefits and its ability to cope with large scale data such as workflows and big data applications. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm by ,, Dwi Pebrianti, Ann Ayop azmi, Nurnajmi Qasrina, Bayuaji, Luhur, Suarin, Nur Aisyah Syafinaz, ,, Muhammad Syafrullah

    Published 2022
    “…In this study, a new proposed hybrid optimization algorithm, called Extended Bat Algorithm (EBA) is used for optimizing the PID controller for the wheel mobile robot. …”
    Get full text
    Get full text
    Book Chapter
  8. 8

    DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS by MEHMOOD SHAH, SYED NASIR

    Published 2012
    “…Grid scheduling is the key issue in grid environment in which its system must meet the functional requirements of heterogeneous domains, which are sometimes conflicting in nature also, like user, application, and network. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A modified generalized RBF model with EM-based learning algorithm for medical applications by Ma, Li Ya, Abdul Rahman, Abdul Wahab, Quek, Chai

    Published 2006
    “…An EM-based training algorithm is also introduced, which uses fewer parameters compared to some classical supervised learning methods. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…The method used to develop this project is Rapid Application Development (RAD). …”
    Get full text
    Get full text
    Final Year Project
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Evaluation of feature selection algorithm for android malware detection by Mazlan, Nurul Hidayah, A Hamid, Isredza Rahmi

    Published 2018
    “…The Android features were filtered before detection process using TF-IDF algorithm. However, IDF is unaware to the training class labels and give incorrect weight value to some features. …”
    Get full text
    Article
  16. 16
  17. 17

    TUNING A THREE-PHASE SEPARATOR LEVEL CONTROLLER VIA PARTICLE SWARM OPTIMIZATION (PSO) ALGORITHM by SATHASIVAM, LUVENRAJ

    Published 2013
    “…In our case, the global best position is replaced with the optimized PID tuning parameters for the separator. The PSO algorithm has been used in several other applications such as the Brushless DC motor and in the Control Ball & Beam system. …”
    Get full text
    Get full text
    Final Year Project
  18. 18
  19. 19
  20. 20

    Content-based recommender system for an academic social network / Vala Ali Rohani by Vala Ali, Rohani

    Published 2014
    “…Four metrics, namely precision, recall, fallout, and F1 were employed to measure the prediction accuracy of each algorithm. Although the experiment conducted presented some threats, the results indicated that the ECSN algorithm not only improves the prediction accuracy of recommendations but also resolves the cold start problem in the existing recommender systems algorithms.…”
    Get full text
    Get full text
    Thesis