Search Results - (( its application tools algorithm ) OR ( its application ((need algorithm) OR (new algorithm)) ))*

Refine Results
  1. 1
  2. 2

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…In addition, with regard to the second algorithm SNBR, the results show that SNBR overcomes the NCPR algorithm terms of normalize routing overhead by 58.80% as its due to its dropping factor. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

    Image steganography using web application / Nor Arzami Othman ... [et al.] by Othman, Nor Arzami, Shariffudin, Muhammad Nur Harith, Osman, Mohd Nizam, Sedek, Khairul Anwar

    Published 2023
    “…The web application proved to be a versatile and practical tool with applications in various fields such as cryptography and digital forensics. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A security payment model for financial payment using mykad by Ahmad Zahari, Nurul Huda

    Published 2011
    “…ARSA will automatically change its security algorithm based on times and attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    University class timetable tool by Ang, Wen Jie

    Published 2022
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10
  11. 11
  12. 12

    Adaptive artificial neural network for power system security assessment and control action by Al-Masri, Ahmed Naufal A.

    Published 2012
    “…This study also investigates the reliability of ANN application in power system security assessment in terms of accuracy and computational time as well as developing a new method that can be included in security assessment tools. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Fast decryption method for a Rabin primitive-based cryptosystem by Asbullah, Muhammad Asyraf, Kamel Ariffin, Muhammad Rezal

    Published 2014
    “…The Chinese Remainder Theorem (CRT) is an algorithm for solving linear congruence system into a unique representation and has been a useful tool in applications of cryptography. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    Evaluate the performance of university timetabling problem with various artificial intelligence techniques by Hooi, Charmaine Wai Yee

    Published 2025
    “…The project focuses on developing an automated university course timetable scheduling tool using Genetic Algorithm (GA). University course timetable scheduling (UCTTP) is a well-known optimization problem due to its NP-hard nature and the complexity of the problem increases exponentially with eh addition of constraints. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Data prediction and recalculation of missing data in soft set / Muhammad Sadiq Khan by Muhammad Sadiq , Khan

    Published 2018
    “…Uncertain data cannot be processed by using the regular tools and techniques of clear data. Special techniques like fuzzy set, rough set, and soft set need to be utilized when dealing with uncertain data, and each special technique comes with its own advantages and snags. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Herb recognition for mobile apps / Jumriyanie Baba by Baba, Jumriyanie

    Published 2017
    “…The mobile application is able to recognize the herbs type using the most suitable algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Optimization of multi-holes drilling toolpath using tiki-taka algorithm by Norazlina, Abdul Rahman

    Published 2024
    “…Future research should prioritize exploring the potential of TTA for integration into automated manufacturing processes and its applicability in maximizing efficiency advantages in other optimization tasks.…”
    Get full text
    Get full text
    Thesis