Search Results - (( _ application during algorithm ) OR ( some applications usage algorithm ))
Search alternatives:
- application during »
- applications usage »
- some applications »
- during algorithm »
- usage algorithm »
-
1
Fruit-Fly Based Searching Algorithm For Cooperative Swarming Robotic System
Published 2013“…Using the existing lawnmower methods incur substantial costs in terms of time, accuracy and reliability. Therefore, the usage of a swarming robotic system is proposed. In this thesis, a simple framework and methodology in developing a bio-inspired algorithm for cooperative swarming robotic application has been developed. …”
Get full text
Get full text
Thesis -
2
Reactive power imbalance method for islanding detection in micro-grid operation
Published 2014“…The passive algorithm implements in this paper due to the low cost operation, however it got the higher non-detection zone (NDZ) and slower response time compare some active methods. …”
Get full text
Get full text
Get full text
Article -
3
-
4
Analysis of energy consumption in a wireless sensor network using fuzzy memberships function
Published 2020“…Due to some applications that require long battery life, various types of research have been conducted to address this problem. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Image Segmentation using Enhanced K-means Clustering with Hybrid Image Filtering for Acute Leukemia Blood Cells Microscopic Images
Published 2024thesis::master thesis -
6
-
7
-
8
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
Published 2006“…This thesis investigates the effect of different scheduling mechanisms and usage of a different marker algorithms then develop and implement a fair scheduling mechanism and integrate it with a shaper with the usage of a very fair efficient marker at the edge of the DiffServ networks with the usage of simulation and analytical techniques. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
Achieving security by combining Huffman and SLSB algorithms
Published 2013Get full text
Get full text
Get full text
Article -
12
-
13
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…But the major treat of the IPSec is caused by the usage or the algorithm that has weak keys. The algorithms are DES, 3DES, Blowfish, Cast128 and RC5. …”
Get full text
Get full text
Conference or Workshop Item -
14
-
15
E-Hadith DV: Hadith scriptures in Syafie Madhhab retrieval using data visualization / Nor Faezahtul Salme Norhisam
Published 2020“…Implementation of sentence-based searching and the usage of the stemming algorithm would be considered to produce more meaningful results for future work.…”
Get full text
Get full text
Thesis -
16
Shuffling algorithms for automatic generator question paper system.
Published 2010Get full text
Get full text
Article -
17
Bidirectional detection method using for hall effects sensors for water flow measurement system
Published 2014“…Lastly, a measurement and monitoring algorithm is developed based on Labview to calculate the flow rate, water consumption and detect the error source and flow direction. …”
Get full text
Get full text
Thesis -
18
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…There are four experiment conducted such as processing time, power usage, memory usage and data modification attack. …”
Get full text
Get full text
Thesis -
19
-
20
Multi-objective optimization of stand-alone hybrid renewable energy system by genetic algorithm
Published 2013“…Some of thes obstacles are cost, reliability and performance. …”
Get full text
Get full text
Thesis
