Search Results - (( developing function using algorithm ) OR ( based implementation among algorithm ))

Refine Results
  1. 1

    Breast cancer disease classification using fuzzy-ID3 algorithm based on association function by Nur Farahaina, Idris, Mohd Arfian, Ismail, Mohd Saberi, Mohamad, Shahreen, Kasim, Zalmiyah, Zakaria, Sutikno, Tole

    Published 2022
    “…The FID3-AF algorithm is a hybridisation of the fuzzy system, the iterative dichotomizer 3 (ID3) algorithm, and the association function. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    A new image scrambling technique using block rotation algorithm based on Rubik’s cube by Abugharsa, Ahmed Bashir, Hasan Basari, Abd Samad, Almangush, Hamida

    Published 2013
    “…Objectives: the objective of this paper is to develop a new efficient image scrambling algorithm by using the Rotation technique in order to break the relationship among image elements (pixels). …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Enhancement of Ant System Algorithm for Course Timetabling Problem by Djamarus, Djasli

    Published 2009
    “…This research starts with developing an algorithm based on original concept of Ant System Algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Enhanced gravitational search algorithm for nano-process parameter optimization problem / Norlina Mohd Sabri by Mohd Sabri, Norlina

    Published 2020
    “…Based on the capabilities of the metaheuristic algorithms, this research is proposing the enhanced Gravitational Search Algorithm (eGSA) to solve the nano-process parameter optimization problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Using genetic algorithms to optimise land use suitability by Pormanafi, Saeid

    Published 2012
    “…In this study, under environmentfriendliness objective, based on multi-agent genetic algorithms, was developed a geospatial model for the land use allocation. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Ontology-based metabolic pathway prediction using saccharomyces cerevisiae data from genbank, ecocyc and kegg by Zakaria, Yuslina

    Published 2006
    “…This approach capable to predict metabolic pathway of S.cerevisiae with 87 percent accuracy compared to 80 percent accuracy using PathoLogic algorithm…”
    Get full text
    Get full text
    Thesis
  11. 11

    A comparative study on optimal structural dynamics using wavelet functions by Mahdavi, S.H., Razak, H.A.

    Published 2015
    “…To demonstrate the validity of the wavelet-based algorithms, aforesaid schemes have been extended to the linear and nonlinear structural dynamics. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    An Artificial Intelligence-Based Knowledge Management System for Outcome-Based Education Implementing in Higher Education Institutions by Gerhana, Yana Aditia

    Published 2025
    “…Recommendation system on learning analysis was implemented in a hybrid algorithm combines Rule-based and Content-based filtering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    From Employees to Entrepreneurs: A Qualitative Exploration of Career Transitions in Ghana by Gerhana, Yana Aditia

    Published 2025
    “…Recommendation system on learning analysis was implemented in a hybrid algorithm combines Rule-based and Content-based filtering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Optimal Power Flow of power systems using Harris Hawks Optimization and Salp Swarm Algorithm by Zohrul, Islam Mohammad

    Published 2021
    “…The obtained results showed the decent improvement comparing to other swarm-based techniques like Whale Optimization Algorithm (WOA), Math Flame (MF), and Glowworm Optimization Algorithm (GOA) in terms of convergence performance and quality. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Denoising of digital images using second generation wavelet transforms-hidden markov model by Khmag, Asem Ib Mohamed

    Published 2016
    “…In this issue, a newly developed algorithm based on second-generation wavelet transformation using semi-soft thresholding is introduced. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik by Abdullah, Abdul Hanan

    Published 2003
    “…Researchers have been developing a system using intrusion detector approach base on differential analysis. …”
    Get full text
    Get full text
    Monograph
  17. 17

    SVM, ANN, and PSF modelling approaches for prediction of iron dust minimum ignition temperature (MIT) based on the synergistic effect of dispersion pressure and concentration by Arshad, U., Taqvi, S.A.A., Buang, A., Awad, A.

    Published 2021
    “…The cubic kernel function was found suitable for training SVMs. Besides, a feed-forward artificial neural network with the backpropagation algorithm and a polynomial surface fit model have also been developed to predict the MIT. …”
    Get full text
    Get full text
    Article
  18. 18

    Computational intelligence based power system security assessment and improvement under multi-contingencies conditions / Nor Rul Hasma Abdullah by Abdullah, Nor Rul Hasma

    Published 2012
    “…Finally, a novel multi-objective Constrained Reactive Power Control (CRPC) algorithm using the state-of-the-art of EP for voltage stability improvement has been developed. …”
    Get full text
    Get full text
    Thesis
  19. 19

    User to user topic recommendation model for student social interaction by Ahmad Subhi, Zolkafly

    Published 2025
    “…This predictive analytics model compared single and multi-classifier accuracy in predicting the importance of a topic for an individual. Then, a newly developed algorithm called the Social Recommendation (SAR) algorithm ranked and recommended the best topic for social interaction. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20