Search Results - (( _ applications usage algorithm ) OR ( based application need algorithm ))
Search alternatives:
- applications usage »
- based application »
- application need »
- usage algorithm »
- need algorithm »
-
1
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…To provide online prediction efficiently, we advance an architecture for online predicting in Web Usage Mining system and propose a novel approach based on LCS algorithm for classifying user navigation patterns for predicting users' future requests. …”
Get full text
Get full text
Article -
2
Relationship based replication algorithm for data grid
Published 2014Get full text
Get full text
Monograph -
3
-
4
Dynamic characterized genetic algorithm for adaptive beam forming in WCDMA system
Published 2005Get full text
Get full text
Get full text
Proceeding Paper -
5
Implementing case-based reasoning approach to framework documentation
Published 2023Subjects:Conference paper -
6
Panoramic image matching method for uav remote sensing based on surf algorithm
Published 2024text::Final Year Project -
7
Optimal Placement of Phasor Measurement Unit (PMU) using genetic algorithm & cuckoo search algorithm
Published 2025Get full text
Get full text
Get full text
Proceeding Paper -
8
-
9
Reinforcement Learning Algorithm for Optimising Durian Irrigation Systems: Maximising Growth and Water Efficiency
Published 2024“…This study presents a Reinforcement Learning-based algorithm designed to optimise irrigation for Durio Zibethinus (i.e., durian) trees, aiming to maximise tree growth and reduce water usage. …”
Get full text
Get full text
Get full text
Article -
10
-
11
An efficient IoT-based smart water meter system of smart city environment
Published 2021“…Therefore, this study aims to implement and analyze an efficient data collection algorithm for IoT-based smart metering applications in consideration with energy consumption. …”
Get full text
Get full text
Get full text
Article -
12
MINIMIZATION OF RESOURCE UTILIZATION FOR A REAL-TIME DEPTH-MAP COMPUTATIONAL MODULE ON FPGA
Published 2011“…Depth-map algorithm allows camera system to estimate depth in many applications. …”
Get full text
Get full text
Thesis -
13
Boundary control of a dual-output boost converter with multilevel inverter topology / Messikh Tarek
Published 2017“…With the development of power electronics applications and the usage of green power technology, many multilevel converters have been proposed. …”
Get full text
Get full text
Get full text
Thesis -
14
Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar
Published 2007“…Through the algorithm, rule-based technique was used. Based on the experiment results, it is proved that the video content adaptation under e-learning environment can be achieved by the algorithms effectively.…”
Get full text
Get full text
Thesis -
15
Application of system identification method coupled with evolutionary algorithms for the optimization of power consumption in a pem fuel cell propulsion system / Suhadiyana Hanapi
Published 2018“…This thesis makes a number of key contributions to the advancement of fuel cell vehicle design within two main research areas; powertrain system design based on quality energy, and optimization system based on biology based algorithms. …”
Get full text
Get full text
Book Section -
16
Differential evolution for neural networks learning enhancement
Published 2008“…These algorithms can be used successfully in many applications requiring the optimization of a certain multi-dimensional function. …”
Get full text
Get full text
Get full text
Thesis -
17
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
Published 2023“…The simulation results demonstrate that the proposed algorithm outperforms existing heuristic and meta-heuristic algorithms, including the benchmarking algorithm (LACE). …”
Get full text
Get full text
Thesis -
18
Enhanced 3D terrain visualization process using game engine
Published 2018“…Several experiments are conducted and performances are measured based on loading time, response time, frames per second (FPS), memory usage and CPU usage of different terrain data types and size. …”
Get full text
Get full text
Get full text
Thesis -
19
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…Second, an improved steganographic algorithm based on the infamous Least Significant Bit (LSB) is proposed for hiding the sensed data scheduled for transmission. …”
Get full text
Get full text
Get full text
Thesis -
20
A flexible query transformation framework for structured retrieval / Gan Keng Hoon
Published 2013“…Once a source query is interpreted and represented as intermediate query, it can be easily mapped to a structured query language using a set of predefined query templates in knowledge base. Lastly, experiments are carried out at the algorithm, application and representation levels on both synthetic and real world data sets to demonstrate the feasibility and scalability of the query transformation framework. …”
Get full text
Get full text
Thesis
