Search Results - (( some application towards algorithm ) OR ( _ application system algorithm ))*

Refine Results
  1. 1

    Securing password authentication using MD5 algorithm by Siti Nabilah , Mohammad Zain

    Published 2014
    “…Apart from protection, a step toward perfect security has taken by using MD5 algorithm…”
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2

    Enhancing Solutions Of Capacity Vehicle Routing Problem Based On An Improvement Ant Colony System Algorithm by Mutar, Modhi Lafta, Mohd Aboobaider, Burhanuddin, Hameed, Asaad Shakir, Yusof, Norzihani

    Published 2019
    “…Several authors over the last only some decades have recognized many types of research and used several algorithms with various methods to solve it. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…It has been applied in many practical applications. For most of the cases of the shortest route finding, the Dijkstra's algorithm is known to be an optimal search algorithm. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Data-driven state of charge estimation of lithium-ion batteries: Algorithms, implementation factors, limitations and future trends by Hossain Lipu M.S., Hannan M.A., Hussain A., Ayob A., Saad M.H.M., Karim T.F., How D.N.T.

    Published 2023
    “…Automotive batteries; Charging (batteries); Digital storage; Electric automobiles; Fossil fuels; Fuel storage; Ions; Lithium-ion batteries; Battery storage system; Data-driven algorithm; Detailed classification; Evaluation indicators; Global carbon emission; High energy densities; State-of-charge estimation; Vehicle applications; Battery management systems…”
    Review
  8. 8

    Opposition- based simulated kalman filters and their application in system identification by Kamil Zakwan, Mohd Azmi

    Published 2017
    “…The COOBSKF also has been compared with five other optimization algorithms and outperforms them all. Besides that, this thesis also presents the application of COOBSKF in a system identification problem. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar by Bakhtiar, Badariyah

    Published 2007
    “…The diversity of multimedia presentation environment sets strict requirements for multimedia applications and systems. Since the invention of the computer, content has been tailored towards a specific device, mainly by hand. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An experimental study of modified black hole algorithms by Mohammed, Suad Khairi

    Published 2018
    “…The second method is the application of a local search. Finally, a gravitational interaction, which is the essence of the gravitational search algorithm, is also applied. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Stray animal complaint system using geolocation technique with rule-based Algorithm / Albin Lemuel Kushan … [et al.] by Kushan, Albin Lemuel, Mahadi, Mohamad Tajuddin, Zulhemay, Mohd Nabil, Sadikan, Siti Fairuz Nurr, Mishan, Mohd Taufik

    Published 2021
    “…Subsequently, local council are also keen to veer towards this adaptation by introducing more technologically based type of services such as parking system using mobile application. …”
    Get full text
    Get full text
    Get full text
    Book Section
  12. 12

    Feature extraction using active appearance model algorithm with Bayesian classification approach by Nuruzzaman, Mohammad, Hussain, Azham, Mohamad Tahir, Hatim, Abu Seman, Mohamad Amir

    Published 2013
    “…It directed towards the illumination-invariant automatic recognition of faces and analysis to improve face verification and identification performance.To compare with other feature extraction at the end of the study, an evaluation has been done with an existing face recognition system using AAM algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Development of a genetic algorithm controller for cartesian robot by Ong, Joo Hun

    Published 2008
    “…Finally, the developed algorithm will been tested and implemented into in this Cartesian robot system.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Simulated Kalman Filter with modified measurement, substitution mutation and hamming distance calculation for solving traveling salesman problem by Suhazri Amrin, Rahmad, Zuwairie, Ibrahim, Zulkifli, Md. Yusof

    Published 2022
    “…We reviewed 57 SKF papers. 16 of them on fundamental improvements, 9 on extension of the algorithm to discrete problems and 25 on their applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Optimizing tree planting areas through integer programming and improved genetic algorithm by Md Badarudin, Ismadi

    Published 2012
    “…The algorithmic solution with some strategies mainly focuses on efficiency. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Vault’s floor security sensor with RFID access using microcontroller: article / Mohd Firdouz Bahtiar by Bahtiar, Mohd Firdouz

    Published 2009
    “…The embedded system automation at such a low cost but demonstrates the same functionality as the commercialize security system paper describe an application of RFID for access whereby the system provides security surveillance towards a certain designated ground or floor. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20