Search Results - (( web applications a algorithm ) OR ( its application ((out algorithm) OR (means algorithm)) ))

Refine Results
  1. 1
  2. 2

    Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges by Abubakar, Adamu, Jabaka, Shehu, Tijani, Bello Idrith, Zeki, Akram M., Chiroma, Haruna, Usman, Mohammed Joda, Raji, Shakirat, Mahmud, Murni

    Published 2014
    “…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases by Hazzaimeh, Yousef Abd-AlMohdi

    Published 2008
    “…Application of data mining to the World Wide Web referred as Web mining is at the cross road of research from several research communities which can be divided into three branches: Web Content Mining, Web Structure Mining and Web Usage Mining. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Human health status IoT device using data optimization algorithm / Albin Lemuel Kushan ... [et al.] by Kushan, Albin Lemuel, Anuar, Muhammad Hazwan, Mohd Supir, Mohd Hafifi, Ahmad Fadzil, Ahmad Firdaus, Zolkeplay, Anwar Farhan

    Published 2021
    “…This project aims to produce a device that can be used to identify the current health status of a person using sensor and a data optimization algorithm. …”
    Get full text
    Get full text
    Book Section
  5. 5

    Content-based recommender system for an academic social network / Vala Ali Rohani by Vala Ali, Rohani

    Published 2014
    “…The algorithm exploits all interests and preferences in a hierarchy tree structure. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari by Nazari, Khairul Nashran

    Published 2017
    “…AES is being used widely in many applications since it is known for its faster encryption and decryption process and its strength. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Support Vector Machines (SVM) in Test Extraction by Ghazali, Nadirah

    Published 2006
    “…Evaluation of the applications are carried out against another accompanying system-generated extract which is already in the market, as a means to observe the amount of sentences overlap with the tested applications, in this case, the Text Extractor and also Microsoft Word AutoSummarizer. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Support Vector Machines (SVM) in Test Extraction by Ghazali, Nadirah

    Published 2006
    “…Evaluation of the applications are carried out against another accompanying system-generated extract which is already in the market, as a means to observe the amount of sentences overlap with the tested applications, in this case, the Text Extractor and also Microsoft Word AutoSummarizer. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Face recognition and identification system (FaceRec) / Khew Jye Huei by Khew , Jye Huei

    Published 2004
    “…Face recognition is a technique to identify an individual by his/her physical characteristic and has been of interest to a growing number of researchers due to its applications on security. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Defect green coffee bean detection using image recognition and supervised learning by Shafian Izan Sofian

    Published 2022
    “…The model was integrated as web application with Flask where user can upload the image and the system will return result with precision and prediction. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  13. 13
  14. 14

    Car license plate detection method for Malaysian plates-styles by using a web camera by Al-Ghaili, Abbas Mohammed Ali, Mashohor, Syamsiah, Ramli, Abdul Rahman, Ismail, Alyani

    Published 2010
    “…This work aims to build a Car License Plate Detection (CLPD) system at a lower cost of its hardware devices and with less complexity of algorithms' design, and then compare its performance with the local CAR Plate Extraction Technology (CARPET). …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Real time traceability module for halal logistic transportation using GPS and geofence technique by Mohamad, Maizatul Akma

    Published 2016
    “…Due to its significant function, whereby a conversion of manual procedure into a web based module is necessary, this module will be effective and brings benefits to the authorities, Halal logistic service providers and also users.…”
    Get full text
    Get full text
    Thesis
  16. 16

    Intent-IQ: customer’s reviews intent recognition using random forest algorithm by Mazlan, Nur Farahnisrin, Ibrahim Teo, Noor Hasimah

    Published 2025
    “…Intent-IQ is a web application system which allows users to input Shopee product link and it leads to the intent classification, where the reviews can be classified into its intent categories such as praise, complaint and suggestion. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Optimization of multi-holes drilling toolpath using tiki-taka algorithm by Norazlina, Abdul Rahman

    Published 2024
    “…A computational experiment was conducted on 12 test problems across small, medium, and large problem categories using the TTA, then compared with Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO), Crayfish Optimization Algorithm (COA), and Geometric Mean Optimizer (GMO). …”
    Get full text
    Get full text
    Thesis
  19. 19

    Dynamic modelling of a flexible beam structure using feedforward neural networks for active vibration control by Tuan Abdul Rahman, Tuan Ahmad Zahidi, As'arry, Azizan, Abdul Jalil, Nawal Aswan, Raja Ahmad, Raja Mohd Kamil

    Published 2019
    “…The performance of modified SFS algorithm to train a nonlinear auto-regressive exogenous model (NARX) structure FNNs-based model of the system was then compared with its predecessor and with several well-known metaheuristic algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Explore Ease by Rahman, Mohammad Miskatur

    Published 2024
    “…The entire application experience, from the moment a user first visits the website to choosing services, logging in and out, and managing preferences and bookings, is made to be as simple as possible to use. …”
    Get full text
    Get full text
    Final Year Project