Search Results - (( based encryption path algorithm ) OR ( parallel visualization learning algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1
  2. 2

    Grid portal technology for web based education of parallel computing courses, applications and researches by Alias, Norma, Islam, Md. Rajibul, Mydin, Suhaimi, Hamzah, Norhafiza, Safiza Abd. Ghaffar, Zarith, Satam, Noriza, Darwis, Roziha

    Published 2009
    “…These courses will actively engage the students in exploring the concepts of the development the parallel algorithm in visualizing the grand challenge applications of mathematical problems. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Route optimization security in mobile IPv6 wireless networks: a test-bed experience by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Acquisition of context-based word recognition by reinforcement learning using a recurrent neural network by Ahmad Afif, Mohd Faudzi

    Published 2012
    “…The developed learning system has a 4-layered RNN and it was trained by BPTT method based on teaching signal that was generated by Q-Learning algorithm. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Acquisition of context-based word recognition by reinforcement learning using a recurrent neural network by Ahmad Afif, Mohd Faudzi

    Published 2012
    “…The developed learning system has a 4-layered RNN and it was trained by BPTT method based on teaching signal that was generated by Q-Learning algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Security enhancement of route optimization in mobile IPv6 networks by Mehdizadeh, Abbas, Khatun, Sabira, Mohd Ali, Borhanuddin, Raja Abdullah, Raja Syamsul Azmir, Kurup, Gopakumar

    Published 2008
    “…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm by cost of little bit increase but tolerable delay. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A novel neuroscience-inspired architecture: for computer vision applications by Hassan, Marwa Yousif, Khalifa, Othman Omran, Abu Talib, Azhar, Olanrewaju, Rashidah Funke, Hassan Abdalla Hashim, Aisha

    Published 2016
    “…The theory behind deep learning, the human visual system was investigated and general principles of how it functions are extracted. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8
  9. 9

    Investigating computational thinking among primary school students in Terengganu using visual programming by Osmanullrazi, Abdullah

    Published 2022
    “…Recent studies have shown that visual programming is one of the efficient tools to develop CT skills. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Image orientation watermarking technique for copyright protection by Jasim, Hend Muslim

    Published 2016
    “…In return, a copyright gains its validity based on such robust characteristics. Watermarking attracts much interest in algorithm design to enable a signature to be embedded on secrecy and encryption beds. …”
    Get full text
    Get full text
    Get full text
    Thesis