Search Results - (( some applications ((a algorithm) OR (_ algorithm)) ) OR ( web location based algorithm ))

Refine Results
  1. 1

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2

    A Web-Based Wound Information and Recovery Prediction System by Ting, Chris Lik Yong

    Published 2020
    “…The system also provides wound recovery prediction using machine learning algorithms. This system is aimed to provide a more effective and efficient wound care management.…”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  3. 3
  4. 4

    Named entity recognition using a new fuzzy support vector machine. by Mansouri, Alireza, Affendy, Lilly Suriani, Mamat, Ali

    Published 2008
    “…Some of the Machine learning algorithms used in NER methods are, support vector machine(SVM), Hidden Markov Model, Maximum Entropy Model (MEM) and Decision Tree. …”
    Get full text
    Get full text
    Article
  5. 5

    Enhancing geographic coordinates representation standard for reverse geocoding web services by Al-Habshi, Mohammed Mustafa Abdulrahman

    Published 2018
    “…Reverse-geocoding is Location Base Services (LBS) that supports mobile and web applications. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A review of slicing techniques in software engineering by Shah, Asadullah, Raza, Ali, Hassan, Basri, Shah, Abdul Salam

    Published 2015
    “…Quite a large numbers of variants for the program slicing have been analyzed along with the algorithms to compute the slice. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7
  8. 8

    An Efficient Computational Algorithm for Solving Arbitrary Sylvester Matrix Equations in Fuzzy Control Theory (S/O 14179) by Ahmad, Nazihah, Ibrahim, Haslinda

    Published 2021
    “…With that, the constructed algorithm is considered as a new contribution to the application of control system theory…”
    Get full text
    Get full text
    Monograph
  9. 9
  10. 10
  11. 11
  12. 12

    Workability review of genetic algorithm approach in networks by Nurika, O., Zakaria, N., Hassan, F., Jung, L.T.

    Published 2014
    “…In some cases, it even outperforms other methods. However, the choice of genetic algorithm might be influenced by some concerns, such as execution time and problem size. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Three-term backpropagation algorithm for classification problem by Saman, Fadhlina Izzah

    Published 2006
    “…Standard Backpropagation Algorithm (BP) is a widely used algorithm in training Neural Network that is proven to be very successful in many diverse application. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Deploying blockchains to simplify AI algorithm auditing by Butt, Ayesha, Zahid Junejo, Aisha, Ghulamani, Sumbul, Mahdi, Ghulam, Shah, Asadullah, Khan, Dodo

    Published 2023
    “…With increasing applications of AI algorithms, the concerns regarding its outcomes have also increased due to bias. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15
  16. 16

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    On density-based data streams clustering algorithms: A survey by Teh, Y.W.

    Published 2017
    “…Due to data streams characteristics, the traditional density-based clustering is not applicable. Recently, a lot of density-based clustering algorithms are extended for data streams. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    VITILIGO LESION ASSESSMENT TOOL ON SMARTPHONE by BORETSKAYA, VIKTORIYA

    Published 2013
    “…However, pigment distribution analysis can be done by using digital image analysis algorithm. The independent component analysis algorithm enables accurate objective measurement of repigmentation and measurements can be made in a short period of time [1]. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Development of heuristic task scheduling algorithm in cloud computing by Diallo, Laouratou, Hassan Abdalla Hashim, Aisha, Olanrewaju, Rashidah Funke

    Published 2016
    “…To this direction, in this paper we make a summary of some scheduling algorithms and propose an Enhanced Greedy Heuristic Scheduling Algorithm (EGHSA) for task scheduling adapted for big data applications. …”
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Adaptive beamforming algorithm based on Simulated Kalman Filter by Kelvin Lazarus, Lazarus

    Published 2017
    “…Some of the metaheuristic algorithms have been modified from the original algorithms to improve the algorithms performance in adaptive beamforming application. …”
    Get full text
    Get full text
    Thesis