Search Results - (( based applications using algorithm ) OR ( some applications usage algorithm ))*

Refine Results
  1. 1
  2. 2

    E-Hadith DV: Hadith scriptures in Syafie Madhhab retrieval using data visualization / Nor Faezahtul Salme Norhisam by Norhisam, Nor Faezahtul Salme

    Published 2020
    “…Implementation of sentence-based searching and the usage of the stemming algorithm would be considered to produce more meaningful results for future work.…”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Noise Cancellation using Selectable Adaptive Algorithm for Speech in Variable Noise Environment by Roshahliza, M. Ramli, Noor, Ali O. Abid, Salina, Abdul Samad

    Published 2017
    “…Some of the teething problems associated in the use of two-sensor noise cancellation systems are the nature of the noise signals—a problem that imposes the use of highly complex algorithms in reducing the noise. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    MINIMIZATION OF RESOURCE UTILIZATION FOR A REAL-TIME DEPTH-MAP COMPUTATIONAL MODULE ON FPGA by NGO , NGO HUY TAN

    Published 2011
    “…Depth-map algorithm allows camera system to estimate depth in many applications. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Fruit-Fly Based Searching Algorithm For Cooperative Swarming Robotic System by Abidin, Zulkifli Zainal

    Published 2013
    “…Using the existing lawnmower methods incur substantial costs in terms of time, accuracy and reliability. Therefore, the usage of a swarming robotic system is proposed. In this thesis, a simple framework and methodology in developing a bio-inspired algorithm for cooperative swarming robotic application has been developed. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar by Bakhtiar, Badariyah

    Published 2007
    “…Through the algorithm, rule-based technique was used. Based on the experiment results, it is proved that the video content adaptation under e-learning environment can be achieved by the algorithms effectively.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Differential evolution for neural networks learning enhancement by Ismail Wdaa, Abdul Sttar

    Published 2008
    “…These algorithms can be used successfully in many applications requiring the optimization of a certain multi-dimensional function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Applying SAX-based time series analysis to classify EEG signal using a COTS EEG device by Shanmuga, Pillai A/L Murutha Muthu

    Published 2021
    “…This research will investigate the application of the Symbolic Aggregate Approximation (SAX) algorithm on top of known supervised machine learning techniques to perform EEG signal classification. …”
    Get full text
    Thesis
  12. 12

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…Furthermore, some analyses on hiding quality show that our algorithm retains the cover image quality as high as that of standard LSB algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Ranking trapezoidal fuzzy numbers based on set theoretic indices with Hurwicz criterion / Nazirah Ramli by Ramli, Nazirah

    Published 2003
    “…This study investigates on the development of the NRI and based on that, two observations and three algorithms are created. …”
    Get full text
    Get full text
    Book Section
  14. 14
  15. 15
  16. 16

    Efficient task scheduling strategies using symbiotic organisms search algorithm for cloud computing environment by Sa'ad, Suleiman

    Published 2022
    “…The SOS and its variants Discrete Symbiotic Organisms Search (DSOS) algorithm have been used to solve different optimisation problems including tasks scheduling in cloud computing environment where results obtained are promising in comparison with stateof- the-art metaheuristic algorithms. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Bayesian Framework based Brain Source Localization Using High SNR EEG Data by Jatoi, M.A., Kamel, N., Gaho, A.A., Dharejo, F.A.

    Published 2019
    “…These sources can be localized using different optimization algorithms. This localization information is usable for diagnoses of brain disorders such as epilepsy, Schizophrenia, depression and Alzheimer. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19
  20. 20