Search Results - (( some application system algorithm ) OR ( its application status algorithm ))

Refine Results
  1. 1

    Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System by Hassan, Mahamat. I, Azween, Abdullah

    Published 2010
    “…We design a service search algorithm for the RA that starts the service look up from the class of request origin first, then to the other classes. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System by HASSAN, MAHAMAT ISSA

    Published 2010
    “…We design a service search I algorithm for the RA that starts the service look up from the class of request origin first, then to the other classes. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.] by Kushan, Albin Lemuel, Anuar, Muhammad Hazwan, Mohd Supir, Mohd Hafifi, Ahmad Fadzil, Ahmad Firdaus, Zolkeplay, Anwar Farhan

    Published 2021
    “…This project aims to produce a device that can be used to identify the current health status of a person using sensor and a data optimization algorithm. …”
    Get full text
    Get full text
    Book Section
  5. 5
  6. 6

    Validation of deep convolutional neural network for age estimation in children using mandibular premolars on digital panoramic dental imaging / Norhasmira Mohammad by Mohammad, Norhasmira

    Published 2022
    “…The semi-automated dental staging system developed in this study is based on the Malay children’s population and uses a brain-inspired learning algorithm termed "deep learning". …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    VITILIGO LESION ASSESSMENT TOOL ON SMARTPHONE by BORETSKAYA, VIKTORIYA

    Published 2013
    “…Android is OS system, designed for touch screen mobiles. It creates easy way of writing applications by providing platforms for implementation.…”
    Get full text
    Get full text
    Final Year Project
  9. 9
  10. 10

    An Efficient Computational Algorithm for Solving Arbitrary Sylvester Matrix Equations in Fuzzy Control Theory (S/O 14179) by Ahmad, Nazihah, Ibrahim, Haslinda

    Published 2021
    “…With that, the constructed algorithm is considered as a new contribution to the application of control system theory…”
    Get full text
    Get full text
    Monograph
  11. 11

    Map navigation for mobile tourist / Rohana Abd Jalil by Abd Jalil, Rohana

    Published 2007
    “…Because of some constraint, so this system is not exploring more on the development of algorithm and representation of map. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A review of object detection in traffic scenes based on deep learning by Zhao, Ruixin, Tang, SaiHong, Supeni, Eris Elianddy, Abdul Rahim, Sharafiz, Fan, Luxin

    Published 2024
    “…It systematically summarizes the Development and current research status of object detection algorithms, and compare the characteristics, advantages and disadvantages of the two types of algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Diabetes prediction system using clonal selection algorithm / Nor Aishah Mustapa by Mustapa, Nor Aishah

    Published 2012
    “…The prediction is done using Artificial Immune System technique where some of applicant’s information is taken to predict and see whether they are predicted having diabetes or not. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Dijkstra’s algorithm in Product Searching System (ProSearch) / Nur Hasni Nasrudin ... [et al.] by Nasrudin, Nur Hasni, Nasaruddin, Siti Hajar, Syed Abdul Halim, Syarifah Syafiqah Wafa, Ahmad Junid, Rosida

    Published 2015
    “…ProSearch is a system that is developed by applying a graph search algorithm called Dijkstra Algorithm so as to find and identify the shortest path to reach the product. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Some studies have also shown the efficiency of RSA algorithm in securing remote login sessions, and electronic credit-card payment systems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A review of YOLO algorithm and its applications in autonomous driving object detection by Wei, Jiapei, As'arry, Azizan, Md Rezali, Khairil Anas, Mohamed Yusoff, Mohd Zuhri, Ma, Haohao, Zhang, Kunlun

    Published 2025
    “…This paper reviews the YOLO algorithm and its application in object detection in autonomous driving scenarios. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    A block-based multi-scale background extraction algorithm by Davarpanah, Seyed Hashem, Khalid, Fatimah, Golchin, Maryam

    Published 2010
    “…In addition, an amended multi-scale algorithm is introduced. This algorithm is a hybrid algorithm, a combination of some nonparametric and parametric filters. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Multi-objective optimization of stand-alone hybrid renewable energy system by genetic algorithm by Nejad, Mohsen Fadaee

    Published 2013
    “…Human development, CO2 emission reduction, availability of renewable sources and rising cost of fossil fuels are some of factors that make utilization of renewable energy systems become more important. …”
    Get full text
    Get full text
    Thesis