Search Results - (( _ application need algorithm ) OR ( some applications usage algorithm ))
Search alternatives:
- applications usage »
- some applications »
- application need »
- usage algorithm »
- need algorithm »
-
1
MINIMIZATION OF RESOURCE UTILIZATION FOR A REAL-TIME DEPTH-MAP COMPUTATIONAL MODULE ON FPGA
Published 2011“…Depth-map algorithm allows camera system to estimate depth in many applications. …”
Get full text
Get full text
Thesis -
2
-
3
Differential evolution for neural networks learning enhancement
Published 2008“…These algorithms can be used successfully in many applications requiring the optimization of a certain multi-dimensional function. …”
Get full text
Get full text
Get full text
Thesis -
4
Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar
Published 2007“…System architecture was designed and implement in video adaptation algorithms development. Through the algorithm, rule-based technique was used. …”
Get full text
Get full text
Thesis -
5
Analysis of energy consumption in a wireless sensor network using fuzzy memberships function
Published 2020“…Thus, the Wireless Sensor Network (WSN) is the preferred choice to meet these needs. However, despite the enthusiasm of building various applications using sensors, the WSN itself is still hampered by limited battery usage. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…Furthermore, some analyses on hiding quality show that our algorithm retains the cover image quality as high as that of standard LSB algorithm. …”
Get full text
Get full text
Get full text
Thesis -
7
Relationship between tiktok usage and youth well-being involving personality characteristics
Published 2022“…By creating a content ecology and recommendation power through algorithms, TikTok enables users with similar interests to expand their social relationships through content sharing, becoming a key trend in social media video applications in China. …”
Get full text
Get full text
Thesis -
8
Comparison between RSA hardware and software implementation for WSNs sexcurity schemes
Published 2010“…The need of security to protect the data through networks has become of vital importance and critical for many sensor network applications. …”
Get full text
Get full text
Proceeding Paper -
9
-
10
-
11
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
Published 2006“…This thesis investigates the effect of different scheduling mechanisms and usage of a different marker algorithms then develop and implement a fair scheduling mechanism and integrate it with a shaper with the usage of a very fair efficient marker at the edge of the DiffServ networks with the usage of simulation and analytical techniques. …”
Get full text
Get full text
Thesis -
12
Achieving security by combining Huffman and SLSB algorithms
Published 2013Get full text
Get full text
Get full text
Article -
13
-
14
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…But the major treat of the IPSec is caused by the usage or the algorithm that has weak keys. The algorithms are DES, 3DES, Blowfish, Cast128 and RC5. …”
Get full text
Get full text
Conference or Workshop Item -
15
-
16
E-Hadith DV: Hadith scriptures in Syafie Madhhab retrieval using data visualization / Nor Faezahtul Salme Norhisam
Published 2020“…Implementation of sentence-based searching and the usage of the stemming algorithm would be considered to produce more meaningful results for future work.…”
Get full text
Get full text
Thesis -
17
Shuffling algorithms for automatic generator question paper system.
Published 2010Get full text
Get full text
Article -
18
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…There are four experiment conducted such as processing time, power usage, memory usage and data modification attack. …”
Get full text
Get full text
Thesis -
19
-
20
Multi-objective optimization of stand-alone hybrid renewable energy system by genetic algorithm
Published 2013“…Some of thes obstacles are cost, reliability and performance. …”
Get full text
Get full text
Thesis
