Search Results - (( based application design algorithms ) OR ( its application drops algorithm ))*
Search alternatives:
- application design »
- based application »
- application drops »
- its application »
-
1
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…In addition, with regard to the second algorithm SNBR, the results show that SNBR overcomes the NCPR algorithm terms of normalize routing overhead by 58.80% as its due to its dropping factor. …”
Get full text
Get full text
Get full text
Thesis -
2
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…Besides, this algorithm provides home users or application developers to implement their own event operators with bespoke syntax for their application purpose by defining cross-events corresponding to the event operators. …”
Get full text
Get full text
Thesis -
3
Quality of service management algorithms in WiMAX networks
Published 2015“…Simulation have been extensively used to evaluate the proposed algorithm. Finally, Discrete Event Simulator (DES) is designed and developed in order to evaluate the performance of the proposed algorithms. …”
Get full text
Get full text
Thesis -
4
Cloud-based lightweight detection of hardhat compliance based on YOLOv5 in power construction site
Published 2025“…Implementing deep learning-based object detection algorithms can facilitate the enforcement of hardhat-wearing compliance, thereby reducing work-related injuries and fatalities. …”
Get full text
Get full text
Thesis -
5
-
6
Tunable Sub-Nanosecond Ultra Wideband Narrow Pulse Generator For Microwave Imaging
Published 2016“…Numerous NPG designs have been developed for specific types of applications and most of them designed for CMOS technology integration. …”
Get full text
Get full text
Thesis -
7
Fractal coding of bio-metric image for face authentication
Published 2021“…This thesis implements the algorithms for the Methods of CPM, BPBM fractal coding, and its application. …”
Get full text
Get full text
Thesis -
8
Blind Source Separation Using Two-Dimensional Nonnegative Matrix Factorization In Biomedical Field
Published 2018“…Blind Source Separation (BSS) refers to the statistical technique of separating a mixture of underlying source signals.BSS denotes as a phenomena and separation on mixed heart-lung sound is one of its example.The challenge of this research is to separate the separate lung sound and heart sound from mixed heart-lung sound.A clear lung sound for diagnosis purpose able to be obtained after separating the mixed heart-lung sound.In biomedical field,lung information is precious due to it has been provided for respiratory diagnosis.However,the interference of heart sound towards lung sound will generate ambiguity and it will lead to drop down the accuracy of diagnosis.Thus,a clean lung sound is needed to increases the accuracy of diagnosis.One of the ways for non-invasive respiratory diagnosis for obtaining lung information is through extracting lung sound from mixed heart-lung sound by using Two-Dimensional Nonnegative Matrix Factorization (NMF2D) algorithm.This method is based on cocktail party effect in which it refers to human brain able to selectively listen to target among a cacophony of conversations and background noise and this considered as a difficult task to machine.Therefore, duplication on cocktail party effect into machine is used to separate the mixed heart-lung sound.This research presents a novel approach NMF2D algorithm in which a suitable model for signal mixture that accommodated the reverberations and nonlinearity of the signals.The objectives of this research are focusing on investigating the useful signal analysis algorithms,defining a new technique of signal separability,designing and developing novel methods for BSS. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
QoS evaluation of different TCPs congestion control algorithm using NS2
Published 2006Get full text
Get full text
Get full text
Proceeding Paper -
10
-
11
A new superimposed topology for single phase wireless power transfer / Azman Ab Malik
Published 2018“…Hybrid system had been developed between online power transfer and energy storage to avoid disturbance. Design of power system based on requirement from user and enviroment must be considered before implementation of WPT technology.…”
Get full text
Get full text
Thesis -
12
A new superimposed topology for single phase wireless power transfer / Azman Ab Malik
Published 2018“…Hybrid system had been developed between online power transfer and energy storage to avoid disturbance. Design of power system based on requirement from user and enviroment must be considered before implementation of WPT technology.…”
Get full text
Get full text
Book Section -
13
-
14
-
15
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
16
Compiler-based prefetching algorithm for recursive data structure
Published 2007“…This project investigates compiler-based prefetching for pointer based applications particularly those containing Recursive Data Structures (RDS) and designs the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
17
-
18
Simulated Kalman Filter algorithms for solving optimization problems
Published 2019“…Its optimality has inspired the development of a metaheuristic algorithm called Heuristic Kalman Algorithm (HKA) in 2009. …”
Get full text
Get full text
Thesis -
19
Fast decryption method for a Rabin primitive-based cryptosystem
Published 2014“…Hence faster decryption algorithms are sought-after. In this paper we design a fast and efficient algorithm for the decryption of the new cryptosystem based on the Rabin primitive. …”
Get full text
Get full text
Get full text
Article -
20
Developing triad design algorithms based on compatible factorization
Published 2011Get full text
Get full text
Get full text
Monograph
