Search Results - (( based application between algorithm ) OR ( spider notification system algorithm ))*
Search alternatives:
- spider notification »
- notification system »
- based application »
- between algorithm »
- system algorithm »
-
1
Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia
Published 2015“…On the second level, TOPSIS algorithm allocates resources among an application’s user based on their criteria and the application’s preferences. …”
Get full text
Get full text
Thesis -
2
Collision avoidance algorithm design for UAV base on parametric theorem and circle overlapping method / Nur Fadzilah Mohamad Radzi
Published 2013“…The algorithm is based on PTCOT (Parametric Theorem and Circle Overlapping Test) between two UAVs. …”
Get full text
Get full text
Thesis -
3
-
4
-
5
Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks
Published 2009“…Lastly, a comparison is made through simulation between all algorithms developed in this research with previous Zero-based algorithms as well as traditional Heuristic algorithms since equal routing results can be obtained between all algorithms. …”
Get full text
Get full text
Thesis -
6
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
7
Document clustering based on firefly algorithm
Published 2015Get full text
Get full text
Get full text
Article -
8
Compiler-based prefetching algorithm for recursive data structure
Published 2007“…This project investigates compiler-based prefetching for pointer based applications particularly those containing Recursive Data Structures (RDS) and designs the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
9
Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman
Published 2017“…The suggestion is made based on matching between the buyer’s preferences and house properties.. …”
Get full text
Get full text
Thesis -
10
-
11
Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks
Published 2015“…Algorithms for mutual exclusion in DS are categorized into two main classes including token-based and permission-based algorithms. …”
Get full text
Get full text
Thesis -
12
Rule-Based Multi-State Gravitational Search Algorithm for Discrete Optimization Problem
Published 2015Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
An FPGA implementation and performance analysis between radix-2 and radix-4 of 4096 point FFT
Published 2018“…Memory-based architecture adopted for the all algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
14
Analysis and Modification of Grain - 128 Stream Cipher Algorithm
Published 2024thesis::master thesis -
15
A Multi-State Gravitational Search Algorithm for Combinatorial Optimization Problems
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Image Encrytion Using Block Based Transformation Algorithm
Published 2008Get full text
Get full text
Get full text
Article -
17
A Rule Extraction Algorithm That Scales Between Fidelity and Comprehensibility
Published 2012“…Since the needs of comprehensibility or fidelity may vary depending on the user or application, this paper presented a significance based rule extraction algorithm that allows a user set parameter to scale between the desired degree of fidelity and comprehensibility of the rules extracted. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Simulated kalman filter (SKF) based image template matching for distance measurement by using stereo vision system
Published 2018“…In addition, it is expected that it can be applied in real-time application. In this study, Simulated Kalman Filter (SKF) is applied to image template matching application as the optimization algorithm. …”
Get full text
Get full text
Thesis -
20
A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali
Published 2012“…The third algorithm describes the application of Decomposition Problem to the signing and verifying digital messages in ECC. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis
