Search Results - (( its application towards algorithm ) OR ( based application tools algorithm ))*

Refine Results
  1. 1
  2. 2

    Restaurant locator using Djikstra Algorithm / Mohamad Aliff Hakimi Lukman Hakim by Lukman Hakim, Mohamad Aliff Hakimi

    Published 2017
    “…This route-finding problem is one of the most important computer applications in the transportation industry. In network theory, it’s known as the shortest-path problem, and Dijkstra’s algorithm is usually used to solve it. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Entiment analysis of public perception on AI chatbots using Support Vector Machine (SVM) algoritm / Tuan Nur Azlina Tuan Ibrahim by Tuan Ibrahim, Tuan Nur Azlina

    Published 2024
    “…The research contributes a comprehensive exploration of sentiment analysis, combining technical expertise with societal insights. The SVM-based sentiment analyzer offers a user-friendly tool bridging complex algorithms and practical applications. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Development of a computer vision-based technique for analysis of hand therapy exercise by Muhammad Zabri, Abu Bakar

    Published 2018
    “…Hand therapy exercises based on computer vision system have many benefits and this has attracted the interest of researchers towards building a computer vision application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Towards a unified image quality assessment technique for cross-content image processing applications by Baqar, Mohtashim *

    Published 2024
    “…It can reconstruct images with five distortion types, outperforming SOTA AS algorithms, even under high distortion. The first stage uses an application-specific reconstruction algorithm, while the second stage employs an IQA-based model called the observation-based bilateral filter (OBF) with non-linear weights calculated using a Haar-PSI-based maximum a posteriori (MAP) estimator. …”
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11
  12. 12

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14
  15. 15
  16. 16

    Image orientation watermarking technique for copyright protection by Jasim, Hend Muslim

    Published 2016
    “…This copy is meant to prevent any deliberate or unintentional attempt to remove the signature from its content. In return, a copyright gains its validity based on such robust characteristics. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan by Aznan, Muhammad Nur Syazwanie Aznan

    Published 2019
    “…Which is why this project objective is to develop a web based clustering tool using K-MEAN++ algorithm. This project will use the rapid application development (RAD) methodology since this are the most suitable method for developing the system. …”
    Get full text
    Get full text
    Thesis
  18. 18

    A genetic similarity algorithm for searching the Gene Ontology terms and annotating anonymous protein sequences by M. Othman, Razib, Deris, Safaai, Md. IIlias, Rosli

    Published 2008
    “…To show the applicability of the basic UTMGO, we extend its structure to develop a Gene Ontology -based protein sequence annotation tool named extended UTMGO. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Digital Transformation Using Industry 4.0 and Artificial Intelligence by Keerthika M., Pragadeesh M., Santhiya M., Jebamalar G.B., Venu H.

    Published 2025
    “…Explainable artificial intelligence (XAI) conducts studies and creates tools, techniques, and algorithm designs that produce information and judgments made by AI-based systems that are comprehensible to humans. …”
    Book chapter
  20. 20