Search

Your search keyword '"Robbi Rahim"' showing total 60 results

Search Constraints

Start Over You searched for: Author "Robbi Rahim" Remove constraint Author: "Robbi Rahim" Topic 02 engineering and technology Remove constraint Topic: 02 engineering and technology
60 results on '"Robbi Rahim"'

Search Results

1. Classification of bird sounds as an early warning method of forest fires using Convolutional Neural Network (CNN) algorithm

2. Energy and Economic Analysis of Curved, Straight, and Spiral Flow Flat-Plate Solar Water Collector

3. Efficient Contourlet Transformation Technique for Despeckling of Polarimetric Synthetic Aperture Radar Image

4. Comprehensive review on recycling of spent lithium-ion batteries

5. Wind power forecasting based on time series model using deep machine learning algorithms

6. Solar still with evacuated tubes and calcium stones to enhance the yield: An experimental investigation

7. Transient liquid phase bonding of stainless steel 316 L to Ti-6Al-4 V using Cu/Ni multi-interlayer: microstructure, mechanical properties, and fractography

8. Novel Multi-Time Scale Deep Learning Algorithm for Solar Irradiance Forecasting

9. State of Charge Estimation of Lithium-Ion Battery for Electric Vehicles Using Machine Learning Algorithms

10. Short-Term Power Prediction of Building Integrated Photovoltaic (BIPV) System Based on Machine Learning Algorithms

11. F, Cl, Br Doped Ge44 and Al22P22 Nanocages As Anode Electrode Materials of Li, Na, and K ion Batteries

12. Applied Pohlig-Hellman algorithm in three-pass protocol communication

13. Understanding disaster risk and development of resilience as one of the fundamental drivers of sustainable development in India with special reference to supercyclone Amphan

14. Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm

15. Enhanced pixel value differencing with cryptography algorithm

16. The Role of Big Data and Cloud Computing for Technology Based Business

17. Enhanced pixel value differencing steganography with government standard algorithm

18. Hashed Needham Schroeder Industrial IoT based Cost Optimized Deep Secured data transmission in cloud

19. Application of Interpolation Image by using Bi-Cubic Algorithm

20. A systematic literature review on attribute independent assumption of Naive Bayes: research trend, datasets, methods and frameworks

21. Web based testing application security system using semantic comparison method

22. Control and Notification Automatic Water Pump with Arduino and SMS Gateway

23. Authentication Security in Radio Frequency Identification with IDEA Algorithm

24. Secure a Transaction Activity with Base64 Algorithm and Word Auto Key Encryption Algorithm

25. Employee Recruitment Fraud Prevention with the Implementation of Decision Support System

26. Combination Base64 and Hashing Variable Length for Securing Data

27. Implementation of the ARIMA(p,d,q) method to forecasting CPI Data using forecast package in R Software

28. Web Based Application for Decision Support System with ELECTRE Method

29. Super-Encryption Cryptography with IDEA and WAKE Algorithm

30. Using K-Means Clustering to Cluster Provinces in Indonesia

31. Mobile Application Detection of Road Damage using Canny Algorithm

32. RC4 Algorithm Visualization for Cryptography Education

33. User acceptance of E-Government Services Based on TRAM model

34. Prototype File Transfer Protocol Application for LAN and Wi-Fi Communication

35. Combination Base64 Algorithm and EOF Technique for Steganography

36. Searching Process with Raita Algorithm and its Application

37. Comparison Between PCI and Box Girder in BridgesPrestressed Concrete Design

38. A Stacked Planar Antenna with Switchable Small Grid Pixel Structure for Directive High Beam Steering Broadside Radiation

39. The Study of Brown Rice Starch Effect On Hydroxyapatite Composites

40. C4.5 Classification Data Mining for Inventory Control

41. Comparison Analysis of TOPSIS and Fuzzy Logic Methods On Fertilizer Selection

42. Development of a secured room access system based on face recognition using Raspberry Pi and Android based smartphone

43. A Novelty Design Of Minimization Of Electrical Losses In A Vector Controlled Induction Machine Drive

44. Congklak, a traditional game solution approach with breadth first search

45. Block Architecture Problem with Depth First Search Solution and Its Application

46. A New Image Encryption Technique Combining Hill Cipher Method, Morse Code and Least Significant Bit Algorithm

47. Comparative Analysis of Membership Function on Mamdani Fuzzy Inference System for Decision Making

48. Symmetric Stream Cipher using Triple Transposition Key Method and Base64 Algorithm for Security Improvement

49. Forecasting Error Calculation with Mean Absolute Deviation and Mean Absolute Percentage Error

50. Research of Simple Multi-Attribute Rating Technique for Decision Support

Catalog

Books, media, physical & digital resources