Search Results - (( developing nation technologies algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- technologies algorithm »
- nation technologies »
- implication based »
- java implication »
-
1
-
2
Smart Agriculture Economics and Engineering: Unveiling the Innovation Behind AI-Enhanced Rice Farming
Published 2024“…Subsequently, the selected superior modified stacked ensemble MLR-SVR-based algorithms are utilized to forecast the 5-year future rice production for each low-middle and upper-middle Southeast Asia nation. …”
Get full text
Get full text
Conference or Workshop Item -
3
Human rights in the digital era : challenges and opportunities from the United Nations human rights system
Published 2021“…International organizations, such as the United Nations, have taken this issue in their hands, although the lack of development of norms regarding digital technology and human rights. …”
Get full text
Get full text
Get full text
Article -
4
A new 128-bit block cipher
Published 2009“…Every country has different requirements when requesting block cipher so there is no limit in developing them. According to the National IT Council (NlTC) report on "Securing Malaysia Sovereignty in the CyberWorld" provided by Ministry of Science, Technology and Innovation, Malaysia, they have outlined critical areas in which new and additional research and development is needed to increase the protection of the national information infrastructure. …”
Get full text
Get full text
Thesis -
5
Analysis and Modification of Grain - 128 Stream Cipher Algorithm
Published 2024thesis::master thesis -
6
-
7
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
8
CAR LICENSE PLATE RECOGNITION BY USING TEMPLATE MATCHING ALGORITHM
Published 2015Get full text
Get full text
Proceeding -
9
Detection of Counterfeit Telecommunication Products using Luhn Checksum Algorithm and an Adapted IMEI Authentication Method
Published 2020“…This algorithm is generally used to validate identification numbers such as IMEI, debit/credit card numbers, social security numbers, national identification numbers etc. …”
Get full text
Get full text
Journal -
10
Secure mobile AES encryptor (SMAE)
Published 2016Get full text
Get full text
Undergraduates Project Papers -
11
-
12
Hybrid Neural Networks and Genetic Algorithm for Fault Detection and Diagnosis of a Plant
Published 2008Get full text
Get full text
Conference or Workshop Item -
13
Performance evaluation of vertical handoff in fourth generation (4G) networks model
Published 2009Get full text
Working Paper -
14
Self-driving car with Artificial Intelligence (AI) technology / Asrul Amin Mohd Isa ... [et al.]
Published 2023“…The autonomous vehicle technology is highly developed and ready for commercial deployment. …”
Get full text
Get full text
Get full text
Article -
15
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Robust Image Watermarking Theories and Techniques: A Review
Published 2014Get full text
Get full text
Get full text
Article -
17
The application of firefly algorithm in an adaptive emergency evacuation centre management (AEECM) for dynamic relocation of flood victims
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Design of artificial intelligence-based electronic Malay language learning tool for visually impaired children
Published 2011“…The percentage of visually impaired people who master Malay language, as the national language in Malaysia, is low. The main purpose for this research is to develop a Malay language learning tool for blind children. …”
Get full text
Get full text
Thesis -
19
Autonomous braking system: automobile use
Published 2022“…The genetic algorithm has been developed to simulate the fundamental characteristics of the automotive braking system. …”
Get full text
Get full text
Get full text
Article -
20
Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas
Published 2002“…Raw fingerprint images and filtered images (noise removal and enhancement) are tested to determine the efficiency of the algorithm developed. The improved algorithm has applied to 350 image samples obtained from National Institute of Standards and Technology (NIST). …”
Get full text
Get full text
Thesis
