Search Results - (( developing era issues algorithm ) OR ( java implication tree algorithm ))
Search alternatives:
- issues algorithm »
- java implication »
- implication tree »
- developing era »
- tree algorithm »
- era issues »
-
1
Human rights in the digital era : challenges and opportunities from the United Nations human rights system
Published 2021“…International organizations, such as the United Nations, have taken this issue in their hands, although the lack of development of norms regarding digital technology and human rights. …”
Get full text
Get full text
Get full text
Article -
2
Towards the utilization of normalized LMS algorithm in adaptive filter
Published 2014“…In this paper, we focused on how the development of algorithms helped reduce the level of noise. …”
Get full text
Get full text
Get full text
Article -
3
-
4
Automated Negative Lightning Return Strokes Characterization Using Brute-Force Search Algorithm
Published 2024Get full text
journal::journal article -
5
Development of automatic obscene images filtering using deep learning
Published 2021Get full text
Get full text
Get full text
Get full text
Book Chapter -
6
Forecast of Muslimah fashion trends in Caca's company / Muhammad Saifullah Mohd Taip
Published 2023“…In conclusion, BI may assist businesses in locating and fixing issues.…”
Get full text
Get full text
Student Project -
7
Development of vehicle counting system by using background subtraction technique / Muhammad Fadhli Md Azemin
Published 2018“…In modern era, traffic congestion is a serious issue in the urban area due to increasing number of vehicles. …”
Get full text
Get full text
Student Project -
8
Evolutionary genetic algorithm as a generative tools in identifying Malay, Chinese and Indian cultural product DNA / Izzuddinazwan Misri
Published 2015“…R.T (2007) and these inform the development of a theoretical for assisting new design DNA transformation. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
SIMULATION AND ANALYSIS OF HARMONIC DETECTION AND MITIGATION SYSTEM USING ACTIVE FILTER
Published 2019“…The main objective for this study is to analyse the harmonics components in AC power system using Fast Fourier Transforms (FFT) algorithm. Other than that, the objective is also to design and develop the harmonic detection system for power quality of AC power system. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
12
Design and implementation of security solution for M-government on mobile platforms using hybrid of NTRU-PKI and aes-rijndael
Published 2023“…The problem faced here is regarding security of transmitted data as cryptography algorithms whether symmetric or asymmetric; suffer from issues of key exchange mechanism or security performance. …”
Article -
13
Overview of Evolutionary Algorithms and Neural Networks for Modern Mobile Communication
Published 2024journal::journal article -
14
SYN Flood detection via machine learning / Muhammad Muhaimin Aiman Mazlan
Published 2018“…The core detection and prevention algorithm which is the support vector machine (SVM) were implemented in this project. …”
Get full text
Get full text
Student Project -
15
Digitally signed electronic certificate for workshop / Azinuddin Baharum
Published 2017“…Digital Signature was encrypted by RSA Algorithm, a very powerful asymmetrical encryption. …”
Get full text
Get full text
Thesis -
16
Cloud Computing in Smart Cities: Privacy, Ethical and Social Issues
Published 2024“…The rapid development of cloud computing technologies has revolutionized various sectors, and smart cities are no exception. …”
Conference Paper -
17
Object-oriented online course recommendation systems based on deep neural networks
Published 2024“…The impact of system maintainability and scalability on escalated development costs is often neglected in the literature. …”
Get full text
Get full text
Article -
18
Efficiency analysis for public key systems based on fractal functions.
Published 2011“…In the last decade, dynamical systems were utilized to develop cryptosystems, which ushered the era of continuous value cryptography that transformed the practical region from finite field to real numbers. …”
Get full text
Get full text
Get full text
Article -
19
Fingerprint frontier: the evolution of biometric security
Published 2023“…Chapter Seven, "Best Practice in Fingerprint Security," emerges as a guiding light, delivering complete methods and procedures for developing and maintaining safe fingerprint systems, with a steadfast dedication to not simply identifying issues but also offering answers. …”
Get full text
Get full text
Get full text
Book -
20
Clustering Based Affinity Propagation In Vanets : Taxonomy And Opportunity Of Research
Published 2019“…This paper is to investigate and analyze several challenges and their present solutions which based on different developed clustering approaches based on the affinity propagation algorithm. …”
Get full text
Get full text
Get full text
Article
