Search Results - (( _ application out algorithm ) OR ( some applications usage algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3

    Applying SAX-based time series analysis to classify EEG signal using a COTS EEG device by Shanmuga, Pillai A/L Murutha Muthu

    Published 2021
    “…This research will investigate the application of the Symbolic Aggregate Approximation (SAX) algorithm on top of known supervised machine learning techniques to perform EEG signal classification. …”
    Get full text
    Thesis
  4. 4
  5. 5

    Car plate recognition based on stroke composition technique / Samsul Setumin, Mohd Ikmal Fitri Maruzuki and Shahrul Nizam Ishak. by Setumin, Samsul, Maruzuki, Mohd Ikmal Fitri, Ishak, Shahrul Nizam

    Published 2012
    “…These different approaches are customized for their various applications. In this algorithm however, it comprises two main processes; character extraction and stroke analysis. …”
    Get full text
    Get full text
    Research Reports
  6. 6
  7. 7
  8. 8

    Bayesian Framework based Brain Source Localization Using High SNR EEG Data by Jatoi, M.A., Kamel, N., Gaho, A.A., Dharejo, F.A.

    Published 2019
    “…The multipurpose application of brain source localization in the domain of biomedical engineering has aggrandized the ways for its further development for various healthcare applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks by Mohamed, Mohamed Awad Elshaikh

    Published 2006
    “…This thesis investigates the effect of different scheduling mechanisms and usage of a different marker algorithms then develop and implement a fair scheduling mechanism and integrate it with a shaper with the usage of a very fair efficient marker at the edge of the DiffServ networks with the usage of simulation and analytical techniques. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Simulation analysis for maximizing renewable solar energy to improve the power generation capacity in the state of Kuwait by Muhaisen, Naser, Khan, Sheroz, Ismail, Zeyad M. A., Habaebi, Mohamed Hadi, Ahmed, Nabil A., Ahmed, Musse Mohamud

    Published 2018
    “…This paper aims to present how to improve power generation capacity in the State of Kuwait through simulation analysis for maximizing the usage of renewable energy applications. Power demand in Kuwait increases every year by 6% that causes load-shedding problems in the national utility grid system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13
  14. 14
  15. 15

    Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof by Md Taujuddin, Nik Shahidah Afifi, Abdullah, Abdul Hanan, Maarof, Mohd Aizaini

    Published 2006
    “…But the major treat of the IPSec is caused by the usage or the algorithm that has weak keys. The algorithms are DES, 3DES, Blowfish, Cast128 and RC5. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    E-Hadith DV: Hadith scriptures in Syafie Madhhab retrieval using data visualization / Nor Faezahtul Salme Norhisam by Norhisam, Nor Faezahtul Salme

    Published 2020
    “…Implementation of sentence-based searching and the usage of the stemming algorithm would be considered to produce more meaningful results for future work.…”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…There are four experiment conducted such as processing time, power usage, memory usage and data modification attack. …”
    Get full text
    Get full text
    Thesis
  20. 20