Search Results - (( using function a algorithm ) OR ( automatic identification parallel algorithm ))

Refine Results
  1. 1

    A security payment model for financial payment using mykad by Ahmad Zahari, Nurul Huda

    Published 2011
    “…ARSA will automatically change its security algorithm based on times and attacks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Projecting named entity tags from a resource rich language to a resource poor language by Zamin, N., Oxley, A., Bakar, Z.A.

    Published 2013
    “…This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism. A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
    Get full text
    Get full text
    Article
  3. 3

    Projecting named entity tags from a resource rich language to a resource poor language by Zamin, N., Oxley, A., Bakar, Z.A.

    Published 2013
    “…This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism. A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
    Get full text
    Get full text
    Article
  4. 4

    Projecting named entity tags from a resource rich language to a resource poor language by Zamin, N., Oxley, A., Bakar, Z.A.

    Published 2013
    “…This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism. A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism. …”
    Get full text
    Get full text
    Article
  5. 5

    Projecting named entity tags from a resource rich language to a resource poor language by Zamin, Norshuhani, Oxley, Alan, Abu Bakar, Zainab

    Published 2012
    “…Named Entity Recognition (NER) is the identification of words in text that correspond to a pre-defined taxonomy such as person, organization, location, date, time, etc.This article focuses on the person (PER), organization (ORG) and location (LOC) entities for a Malay journalistic corpus of terrorism.A projection algorithm, using the Dice Coefficient function and bigram scoring method with domain-specific rules, is suggested to map the NE information from the English corpus to the Malay corpus of terrorism.The English corpus is the translated version of the Malay corpus.Hence, these two corpora are treated as parallel corpora. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    System Identification And Control Of Automatic Car Pedal Pressing System For Low-Speed Driving In A Road Traffic Delay by Lai, Chong Jin

    Published 2022
    “…This project presents system identification and control of automatic car pedal pressing system for low-speed driving in a road traffic delay. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7

    An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa by Isa, Iza Sazanita

    Published 2018
    “…This research proposes a method for automatic detection of WMH in white matter (WM) tissue for MRI images. …”
    Get full text
    Get full text
    Book Section
  8. 8

    An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa by Isa, Iza Sazanita

    Published 2018
    “…This research proposes a method for automatic detection of WMH in white matter (WM) tissue for MRI images. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions by Abbas, Iraq Tareq

    Published 2018
    “…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources by Al-Qadhi, Abdulrahman K., Athauda, Rukshan, Latip, Rohaya, Hussin, Masnida

    Published 2026
    “…We have evaluated the FaaSBid model and the proposed algorithms and pricing model by comparing with a number of existing models and algorithms using real-world datasets. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Computing the autopilot control algorithm using predictive functional control for unstable model by H. A., Kasdirin, J. A., Rossiter

    Published 2009
    “…This paper discusses the computing development of a control algorithm using Predictive Functional Control (PFC) for model-based that having one or more unstable poles. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms by Alzaeemi, Shehab Abdulhabib, Tay, Kim Gaik, Huong, Audrey, Sathasivam, Saratha, Majahar Ali, Majid Khan

    Published 2023
    “…Based on the results, the EP algorithm achieved a higher training rate and simple structure compared with the rest of the algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A-star (A*) algorithm implementation for robotics path planning navigation by Emirul Ridzwan, Nor Azmi

    Published 2018
    “…This thesis is about the implementation of Astar (A*) algorithm as path planning algorithm used in robotics navigation. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17
  18. 18

    An efficient computation technique for cryptosystems based on Lucas functions by Md Ali, Zulkarnain, Othman, Mohamed, Md. Said, Mohamad Rushdan, Sulaiman, Md. Nasir

    Published 2008
    “…We have found that the binary sequence used in a new algorithm is shorter than a special sequence used in an existing algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    A video-rate color image segmentation using adaptive and statistical membership function by Sojodishijani, Omid, Rostami, Vahid, Ramli, Abdul Rahman

    Published 2010
    “…In this algorithm, statistical information of regions is used to create fuzzy membership functions in color model components. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20