Search Results - (( based application ((a algorithm) OR (new algorithm)) ) OR ( some applications acs algorithm ))
Search alternatives:
- based application »
- some applications »
- applications acs »
- new algorithm »
- acs algorithm »
- a algorithm »
-
1
Ant colony optimization in dynamic environments
Published 2010“…When coupled with a local search technique, a significant improvement can be seen for ACS using the 3-opt local search algorithm. …”
Get full text
Get full text
Get full text
Thesis -
2
DC-based PV-powered home energy system
Published 2017“…A controller based on an algorithm of one time maximum power point (MPP) is proposed to mitigate those losses. …”
Get full text
Get full text
Thesis -
3
Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation
Published 2000“…This thesis focuses on ways to improve the existing solutions in the algorithmic and implementation aspects. For the algorithmic aspect, the basic principles of motion compensated DCT block-based compression scheme was studied. …”
Get full text
Get full text
Thesis -
4
-
5
-
6
-
7
-
8
Adaptive Traffic Prioritization Algorithm Over Ad Hoc Network Using IEEE 802.11e
Published 2016“…This thesis proposes an adaptive traffic prioritization algorithm over ad hoc network using IEEE 802.11e standard that defines a set of Quality of Service enhancements for wireless LAN applications through modifications to the Media Access Control (MAC) layer. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Performance comparison of classification algorithms for EEG-based remote epileptic seizure detection in wireless sensor networks
Published 2014“…Identification of epileptic seizure remotely by analyzing the electroencephalography (EEG) signal is very important for scalable sensor-based health systems.Classification is the most important technique for wide-ranging applications to categorize the items according to its features with respect to predefined set of classes.In this paper, we conduct a performance evaluation based on the noiseless and noisy EEG-based epileptic seizure data using various classification algorithms including BayesNet, DecisionTable, IBK, J48/C4.5, and VFI.The reconstructed and noisy EEG data are decomposed with discrete cosine transform into several sub-bands.In addition, some of statistical features are extracted from the wavelet coefficients to represent the whole EEG data inputs into the classifiers.Benchmark on widely used dataset is utilized for automatic epileptic seizure detection including both normal and epileptic EEG datasets.The classification accuracy results confirm that the selected classifiers have greater potentiality to identify the noisy epileptic disorders.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Enhancing the stability of the improved-LEACH routing protocol for WSNs
Published 2018“…A new protocol is proposed in this paper: Stable Improved Low Energy Adaptive Clustering Hierarchy (SILEACH), which was developed to overcome the flaws of the Improved LEACH protocol. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis -
13
Adaptive beamforming algorithm based on Simulated Kalman Filter
Published 2017“…A modified version of the SKF algorithm, named Opposition-Based SKF (OBSKF), introduced by K. …”
Get full text
Get full text
Thesis -
14
Propose a New Machine Learning Algorithm based on Cancer Diagnosis
Published 2018“…In this review, we focus on the current status of machine learning applications in cancer research, also propose a new algorithm Fast Learning Network to work based on cancer research.…”
Get full text
Get full text
Get full text
Article -
15
A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali
Published 2012“…It is a new approach which performs core operation using multiplication of points based in ECC. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
16
-
17
Enhance key generation algorithm based user string identity as public key
Published 2015“…This algorithm uses a user’s identity to replace the numbers that are used as a public key in the RSA algorithm. …”
Get full text
Get full text
Thesis -
18
-
19
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023“…A new case is retained in the case base for future retrievals. …”
Conference paper -
20
