Search Results - (( its application tools algorithm ) OR ( based application towards algorithm ))*

Refine Results
  1. 1
  2. 2

    Restaurant locator using Djikstra Algorithm / Mohamad Aliff Hakimi Lukman Hakim by Lukman Hakim, Mohamad Aliff Hakimi

    Published 2017
    “…This route-finding problem is one of the most important computer applications in the transportation industry. In network theory, it’s known as the shortest-path problem, and Dijkstra’s algorithm is usually used to solve it. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Entiment analysis of public perception on AI chatbots using Support Vector Machine (SVM) algoritm / Tuan Nur Azlina Tuan Ibrahim by Tuan Ibrahim, Tuan Nur Azlina

    Published 2024
    “…The research contributes a comprehensive exploration of sentiment analysis, combining technical expertise with societal insights. The SVM-based sentiment analyzer offers a user-friendly tool bridging complex algorithms and practical applications. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Development of a computer vision-based technique for analysis of hand therapy exercise by Muhammad Zabri, Abu Bakar

    Published 2018
    “…Hand therapy exercises based on computer vision system have many benefits and this has attracted the interest of researchers towards building a computer vision application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Towards a unified image quality assessment technique for cross-content image processing applications by Baqar, Mohtashim *

    Published 2024
    “…This has sparked significant interest in image quality assessment (IQA) and its applications within the research community. …”
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11
  12. 12

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14
  15. 15

    Image orientation watermarking technique for copyright protection by Jasim, Hend Muslim

    Published 2016
    “…This copy is meant to prevent any deliberate or unintentional attempt to remove the signature from its content. In return, a copyright gains its validity based on such robust characteristics. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Evidence-based diagnostic algorithm for visceral leishmaniasis in Bangladesh by Salam, Md. Abdus, Huda, M. Mamun, Khan, Md. Gulam Musawwir, Shomik, Mohammad Sohel, Mondal, Dinesh

    Published 2021
    “…Diagnostic precision and other inherent indicators were considered for index scoring (IS) of performance of tools using factor analysis. A diagnostic algorithm was formulated based on the IS and availability of the tools at different health care facilities of Bangladesh. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Digital Transformation Using Industry 4.0 and Artificial Intelligence by Keerthika M., Pragadeesh M., Santhiya M., Jebamalar G.B., Venu H.

    Published 2025
    “…Explainable artificial intelligence (XAI) conducts studies and creates tools, techniques, and algorithm designs that produce information and judgments made by AI-based systems that are comprehensible to humans. …”
    Book chapter
  18. 18

    University class timetable tool by Ang, Wen Jie

    Published 2022
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Comparison of surface roughness in end milling of titanium alloy Ti-6Al-4V using uncoated WC-Co and PCD inserts through generation of models by Ginta, Turnad Lenggo, Amin, A. K. M. Nurul, Ishtiyaq, M. H.

    Published 2011
    “…They found that the proposed model is suitable for practical engineering application, since the milling force analyzed in the model has already encompassed the structural characteristics of the milling machine and the real conditions of the tool and workpiece. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  20. 20

    A genetic similarity algorithm for searching the Gene Ontology terms and annotating anonymous protein sequences by M. Othman, Razib, Deris, Safaai, Md. IIlias, Rosli

    Published 2008
    “…To show the applicability of the basic UTMGO, we extend its structure to develop a Gene Ontology -based protein sequence annotation tool named extended UTMGO. …”
    Get full text
    Get full text
    Get full text
    Article