Search Results - (( its application tools algorithm ) OR ( its application towards algorithm ))*
Search alternatives:
- application tools »
- towards algorithm »
- its application »
- tools algorithm »
-
1
RISC-V instruction set extension on blockchain application
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Restaurant locator using Djikstra Algorithm / Mohamad Aliff Hakimi Lukman Hakim
Published 2017“…This route-finding problem is one of the most important computer applications in the transportation industry. In network theory, it’s known as the shortest-path problem, and Dijkstra’s algorithm is usually used to solve it. …”
Get full text
Get full text
Thesis -
3
Entiment analysis of public perception on AI chatbots using Support Vector Machine (SVM) algoritm / Tuan Nur Azlina Tuan Ibrahim
Published 2024“…The SVM-based sentiment analyzer offers a user-friendly tool bridging complex algorithms and practical applications. …”
Get full text
Get full text
Thesis -
4
Design Of Navigation Algorithm For F_Bot For Patrolling Using Fuzzy Logic
Published 2006Get full text
Get full text
Monograph -
5
Obstacle Detection And Avoidance System
Published 2018“…The obstacle detection and avoidance system is being researched to study its application in automated machine. Few electronic components like sensors and robot car as experiment tool are needed to study this system and the motion or kinematics of the system is also studied throughout the research. …”
Get full text
Get full text
Monograph -
6
-
7
Anders Breivik’s manifesto: measuring violence indicator in anti-Islamic extremist discourse
Published 2024Get full text
Get full text
Get full text
Proceeding Paper -
8
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
9
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Concrete surface inspection by using Unmanned Aerial Vehicle (UAVs) and deep learning algorithms Yolov7
Published 2024“…These images are then processed using Yolov7, a state-of-the-art object detection algorithm, to accurately identify and classify surface cracks. …”
Get full text
Get full text
Conference or Workshop Item -
11
Development of a computer vision-based technique for analysis of hand therapy exercise
Published 2018“…Hand therapy exercises based on computer vision system have many benefits and this has attracted the interest of researchers towards building a computer vision application. The innovation of measurement tool in computer vision application for the exercise also have undergone continuously improvement which is using wearable sensor, robot aid and computer vision. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
A Review of Genetic Algorithm: Operations and Applications
Published 2024“…This article presents a review of the Genetic Algorithm (GA), a prominent optimization technique inspired by natural selection and genetics. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Towards a unified image quality assessment technique for cross-content image processing applications
Published 2024“…This has sparked significant interest in image quality assessment (IQA) and its applications within the research community. …”
Get full text
Thesis -
16
Toward Quantum-Resilient PKI: A Systematic Literature Review of Post-Quantum Certificates Model
Published 2026journal::journal article -
17
-
18
-
19
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
20
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
