Search Results - (( using function new algorithm ) OR ( knowledge implementation using algorithm ))
Search alternatives:
- knowledge implementation »
- implementation using »
- using algorithm »
- using function »
- new algorithm »
- function new »
-
1
-
2
Job recruiting system using sorting Algorithm / Adi Asyraf Ayob
Published 2020“…The purpose of this project is to develop a web-based job recruiting system with implementation of sorting algorithm. The sorting algorithm will assist the recruiters in selecting best job candidate by assigning score to each applicants and sort the applicant list by the finest score value. …”
Get full text
Get full text
Thesis -
3
Statistical analysis, ciphertext only attack, improvement of generic quasigroup string transformation and dynamic string transformation
Published 2018“…While the dynamic string transformation increase the difficulty level of predicting the substitution table used. The algorithms will be compared in terms of randomness using NIST statistical test suit, correlation Assessment and frequency Distribution.…”
Get full text
Get full text
Article -
4
Semantic analysis system by using latent semantic analysis (LSA) algorithm on khutbah texts / Ammar Zuber
Published 2019“…The implementation phase are done by developing the project based on the Python language and also the gensim package tool that are available for use. …”
Get full text
Get full text
Thesis -
5
A Survey Of Supervised Machine Learning In Wireless Sensor Network: A Power Management Perspective
Published 2013“…Machine learning algorithms are iteration based algorithms, as the new knowledge is based on the previous predicted /calculated knowledge which helps to decrease errors in order to increase efficiency. …”
Get full text
Get full text
Conference or Workshop Item -
6
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…HIDUP is different from any current image steganography system available in the market as it implements two different encryption algorithms, which are Libsodium and Bcrypt, to provide more security. …”
Get full text
Get full text
Get full text
Book Section -
7
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…HIDUP is different from any current image steganography system available in the market as it implements two different encryption algorithms, which are Libsodium and Bcrypt, to provide more security. …”
Get full text
Get full text
Get full text
Book Section -
8
Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line
Published 2020“…The hybrid Wavelet Multiresolution Analysis and Machine learning algorithm (WMRA-ML) is used to extracts the useful hidden knowledge from decomposed one-cycle fault transient signals (voltage & current) from four Matlab/Simulink CIGRE models. …”
Get full text
Get full text
Thesis -
9
Teaching students interdisciplinary knowledge through compilation of differential models within the framework of course projects / Duisebek Nurgabyl ... [et al.]
Published 2023“…The following article proposes an algorithm for the implementation of interdisciplinary learning, the compilation of differential models on the example of the implementation of an integrated course project by students – future teachers of mathematics, chemistry and physics. …”
Get full text
Get full text
Get full text
Article -
10
Finger Exoskeleton for Early Acute Post Stroke Rehabilitation: Control Design and Performance Analysis
Published 2023Conference Paper -
11
-
12
QR factorization equalisation scheme for mode devision multiplexing transmission in fibre optics
Published 2016“…The algorithm mentioned in the study reduces the computational complexity problem which is one of the main issues that accompany currently used tap filter algorithms, such as (LMS) and (RLS). …”
Get full text
Get full text
Get full text
Thesis -
13
A block cipher based on genetic algorithm
Published 2016“…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
Get full text
Get full text
Get full text
Thesis -
14
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…In the algorithm development a step-by-step example of the algorithm implementation is presented and then successfully implemented in Lego Mindstorm obstacle avoiding mobile robot as a proof of concept implementation of the hybrid AI algorithm. …”
Get full text
Get full text
Thesis -
15
Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions
Published 2018“…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
Get full text
Get full text
Thesis -
16
Spatial Data Mining Model For Landfill Sites Suitability Mapping Based On Neural Networks And Multivariate Analysis
Published 2017“…The learned network was used to acquire the weights of the criteria. The optimum structure of the proposed network was selected using 600,000 use cases. …”
Get full text
Get full text
Thesis -
17
An efficient computation technique for cryptosystems based on Lucas functions
Published 2008“…We have found that the binary sequence used in a new algorithm is shorter than a special sequence used in an existing algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
18
FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources
Published 2026“…Next, the Dynamic Demand Replacement Algorithm (DDRA) algorithm is used to place in-demand functions near the edge nodes periodically, while the proposed task scheduling algorithm - Maximum Revenue Bid (MRB) is used to give priority to tasks to maximise revenue near the edge. …”
Get full text
Get full text
Get full text
Article -
19
New heuristic function in ant colony system for the travelling salesman problem
Published 2012“…However, one part of the algorithm, called heuristic function, is not updated at any time throughout the process to reflect the new information discovered by the ants.This paper proposes an Enhanced Ant Colony System algorithm for solving the Travelling Salesman Problem.The enhanced algorithm is able to generate shorter tours within reasonable times by using accumulated values from pheromones and heuristics.The proposed enhanced ACS algorithm integrates a new heuristic function that can reflect the new information discovered by the ants. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
The implementation of z-numbers in fuzzy clustering algorithm for wellness of chronic kidney disease patients
Published 2019“…Consequently, the implementation of z-numbers in fuzzy clustering algorithm is taken into consideration, where it has more authority to describe the knowledge of human being and extensively used in uncertain information development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
