Search Results - (( some application a algorithm ) OR ( based application ((rsa algorithm) OR (tree algorithm)) ))*

Refine Results
  1. 1
  2. 2
  3. 3

    Optimizing tree planting areas through integer programming and improved genetic algorithm by Md Badarudin, Ismadi

    Published 2012
    “…The algorithmic solution with some strategies mainly focuses on efficiency. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    A true random number generator for crypto embedded systems by M.Thamrin, Norashikin, Ahmad, Illiasaak, Hani, Mohamed Khalil

    Published 2006
    “…Random number generators (RNG) are required to generate public/private key pairs for asymmetric algorithm such as RSA and symmetric algorithm such as AES. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Hardware development of autonomous mobile robot based on actuating lidar by Mohd Romlay, Muhammad Rabani, Mohd Ibrahim, Azhar, Toha, Siti Fauziah, Rashid, Muhammad Mahbubur, Ahmad, Muhammad Syahmi

    Published 2022
    “…From here, the extracted values are implied on k-NN, Decision Tree and CNN training algorithm. The final result shows promising potential with 91% prediction when implemented on the Decision Tree algorithm based on our proposed system of a single actuating LiDAR sensor.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11

    Content-based recommender system for an academic social network / Vala Ali Rohani by Vala Ali, Rohani

    Published 2014
    “…The algorithm exploits all interests and preferences in a hierarchy tree structure. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Knowledge-based system developement for the game congkak / Syah Ali Reza Yaacob by Yaacob, Syah Ali Reza

    Published 2006
    “…Therefore, the Minimax algorithm is not applicable. The players are human and a goal-based agent. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…Here, we introduce a measure of similarity based on the circular distance and obtain a cluster tree using the single linkage clustering algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
    Get full text
    Get full text
    Thesis
  19. 19

    WA VELET-DCT BASED IMAGE CODER FOR VIDEO CODING APPLICATIONS by GANI, REGINA

    Published 2008
    “…This process is also known as thresholding. The Wavelet-DCT algorithm is integrated into a simulation of intra-frame coder in compliance with MPEG-2 standard. …”
    Get full text
    Get full text
    Final Year Project
  20. 20