Search Results - (( developing information during algorithm ) OR ( java implication tree algorithm ))

Refine Results
  1. 1

    A simulation software for DNA computing algorithms implementation by Muhammad, M.S., Masra, S.M.W., Kipli, K., Zamhari, N.

    Published 2010
    “…This simulation software capability is unlimited where problem of any size and complexity can be simulated, thus saving cost due to possible errors during the design process. Information regarding the DNA sequence during the computing process as well as the computing output…”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM) by Shuwandy, Moceheb Lazam

    Published 2012
    “…In the end of 2010 the researcher Engineer Moceheb Lazam during his studies at the Masters in the Universiti Utara Malaysia, develop this algorithm in order to keep the encryption and decoding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Mobile Map-Based Positioning System Using Segmentation Algorithm (MM-BPS) by Migdady, Hazem Moh'd Ali

    Published 2008
    “…Vaishnavi and Kuechler Methodology has been implemented in various applications and it considered as a general methodology to develop totally new algorithms and create new information according to the accumulated information. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network by Ridwan M.A., Radzi N.A.M., Azmi K.H.M., Abdullah F., Ahmad W.S.H.M.W.

    Published 2024
    “…The ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
    Article
  6. 6

    Fetal R-Wave detection in the ambulatory monitoring of maternal abdominal signal by Mohd Alauddin Mohd Ali, Crowe, J.A., Hayes-Gill, B.R.

    Published 1995
    “…An algorithm for the real-time measurement of the fetal and maternal RR intervals from a single-lead abdominal signal has been developed on a low power TMS32010 digital signal processor development system. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    COVID-19 DATA EXPLORATION USING MAPPER ALGORITHM by Carey, Ling Yu Fan

    Published 2023
    “…The resulting mapper graphs reveal the pandemic’s development progress across time and place during year 2021. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  9. 9
  10. 10

    Ascertaining trust of information transmitted during a disaster by Yusoff, Y., Bakar, A.A., Aziz, N., Ismail, R., Ramli, R.

    Published 2016
    “…During a disaster, especially at the beginning, a huge amount of information is being communicated by the victims to the authority/rescuer. …”
    Get full text
    Get full text
    Article
  11. 11

    Ascertaining trust of information transmitted during a disaster by Yusoff, Y., Bakar, A.A., Aziz, N., Ismail, R., Ramli, R.

    Published 2016
    “…During a disaster, especially at the beginning, a huge amount of information is being communicated by the victims to the authority/rescuer. …”
    Get full text
    Get full text
    Article
  12. 12

    Agro-ento bioinformation: towards the edge of reality by Syed Hassan, Syed Tajuddin

    Published 2002
    “…Bioinformation, in brief, comprises biology, information algorithms, information technology, and communication protocols. …”
    Get full text
    Get full text
    Inaugural Lecture
  13. 13

    CleverSecure ONLINE System by Ab. Kadir, Shamimi

    Published 2008
    “…The email system used to send the encrypted file to the third party. During the development of COS, the specific methodology used which is Prototyping Process. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Development of intrusion detection system using residual feedforward neural network algorithm by Rustam, Rushendra, Ramli, Kalamullah, Hayati, Nur, Ihsanto, Eko, Gunawan, Teddy Surya, Halbouni, Asmaa Hani

    Published 2022
    “…An intrusion detection system (IDS) is required to protect data from security threats that infiltrate unwanted information via a regular channel, both during storage and transmission. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15
  16. 16

    Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas by Sulong, Siti Masrina

    Published 2002
    “…This requires time consuming and lots of information may be lost during the processes. Thus, Maio and Maltoni (1997) proposed a method to detect minutiae in gray scale fingerprint images based on ridge line following algorithm, which is to trail the ridge line according to the fingerprint directional image. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Range sensor based local path planning algorithm for mobile robot in unknown static environment with beacon / Wan Ahmad Jailani Wan Ngah by Wan Ngah, Wan Ahmad Jailani

    Published 2013
    “…PointsBug also avoids the necessity to store any information about previous positions of navigation such as hit point, leaving point and previous position in Bug algorithms family developed by past researches. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Real-time measurement and gait detection algorithm for motion control of active ankle foot orthosis / Aminuddin Hamid by Hamid, Aminuddin

    Published 2015
    “…From the result analysis, the developed control algorithm shows that the realtime GRF measurement has the ability to enhance the AAFO functional performance and improve the patient gait.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Rule-based filtering algorithm for textual document by Jamil, Nurul Syafidah, Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2017
    “…Improper filtration might cause terms that have similar meaning to be removed.Thus, to reduce the high-dimensionality of text, this study proposed a filtering algorithm that is able to filter the important terms from the pre-processed text and applied term weighting scheme to solve synonym problem which will help the selection of relevant term.The proposed filtering algorithm utilizes a keyword library that contained special terms which is developed to ensure that important terms are not eliminated during filtration process.The performance of the proposed filtering algorithm is compared with rough set attribute reduction (RSAR) and information retrieval (IR) approaches.From the experiment, the proposed filtering algorithm has outperformed both RSAR and IR in terms of extracted relevant terms.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20