Search Results - (( its applications ((means algorithm) OR (acs algorithm)) ) OR ( web application _ algorithm ))*

Refine Results
  1. 1
  2. 2

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Facial image retrieval on semantic features using adaptive mean genetic algorithm by Shnan, Marwan Ali, Rassem, Taha H., Nor Saradatul Akmar, Zulkifli

    Published 2019
    “…The performance matrix of the AMGA was compared to those of particle swarm optimization algorithm (PSO) and genetic algorithm (GA) and found to perform better; thus, proving its efficiency.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6
  7. 7

    Intent-IQ: customer’s reviews intent recognition using random forest algorithm by Mazlan, Nur Farahnisrin, Ibrahim Teo, Noor Hasimah

    Published 2025
    “…Intent-IQ is a web application system which allows users to input Shopee product link and it leads to the intent classification, where the reviews can be classified into its intent categories such as praise, complaint and suggestion. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means by Chimphlee, Witcha, Md. Sap, Mohd. Noor, Abdullah, Abdul Hanan, Chimphlee, Siriporn

    Published 2005
    “…The objective of this paper is to describe a rough sets and fuzzy c-means algorithms and discuss its usage to detect intrusion in a computer network. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Real-time vehicle counting using custom YOLOv8n and DeepSORT for resource-limited edge devices by Saadeldin, Abuelgasim, Rashid, Muhammad Mahbubur, Shafie, Amir Akramin, Hasan, Tahsin Fuad

    Published 2024
    “…Recently, there has been a significant increase in the use of deep learning and low-computing edge devices for analysis of video-based systems, particularly in the field of intelligent transportation systems (ITS). One promising application of computer vision techniques in ITS is in the development of low- computing and accurate vehicle counting systems that can be used to eliminate dependence on external cloud computing resources. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    The conceptual framework of knowledge of large scale and incomplete graphs of skyline queries optimization using machine learning by Noor, Ubair, Hassan, Raini, Dwi Handayani, Dini Oktarina

    Published 2025
    “…Ever since its introduction into the database community, skyline queries have been widely adopted in a range of contemporary database applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13

    Lower Form Grade System (LF-Grade Sys) / Norhanisha Yusof ... [et al.] by Yusof, Norhanisha, A. Sanggar, Logineey, Kalidason, Tiivashkkar, Saravanan, Puvithra

    Published 2023
    “…Therefore, the objective of this study is to develop a Lower Form Grade System (LF-Grade Sys), which is a web-based application grading system that is designed to help teachers systematically record and store pupil grades. …”
    Get full text
    Get full text
    Book Section
  14. 14
  15. 15
  16. 16

    Steganography For Embedding Data In Digital Image by Sowan, Salah Ibrahem

    Published 2003
    “…In the design part, we present new data hiding algorithms for binary images, grayscale and color images, covering such applications as annotation, fingerprinting, and ownership protection.…”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    An e-voting application using cryptography technology by Chin, Hsin Tien

    Published 2020
    “…The project is mainly a web application for the purpose of online voting. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Text Extraction Algorithm for Web Text Classification by Theab, Mustafa Muwafak

    Published 2010
    “…A text extraction prototype is built using Visual C# 2008 to validate the algorithm. It is a windows application mixed with web connection protocol. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20