Search Results - (( based constructive method algorithm ) OR ( frames detection packet algorithm ))
Search alternatives:
- based constructive »
- method algorithm »
- frames detection »
- detection packet »
- packet algorithm »
-
1
Depth frame loss concealment for wireless transmission utilising motion detection information
Published 2014“…The proposed method is able to improve the quality of video in comparison with frame copy algorithm. The feasibility and performance of the proposed method based on motion detection error concealment is evaluated analytically by considering different packet and frame loss rates. …”
Get full text
Get full text
Thesis -
2
A study of frame timing synchronization for WiMAX applications
Published 2007“…The two synchronization algorithms analyzed are Schmidl and Cox technique and double sliding window packet detection. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Design and implementation of smart wireless campus network based on lora and wi-fi
Published 2023“…This project presents the development of a smart application that uses object detection and tracking algorithms to count the number of passengers on the UTAR bus. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
WIMAX INNER RECEIVER DESIGN
Published 2007“…Frame timing synchronization is achieved accurately without uncertainties of detecting a plateau. …”
Get full text
Get full text
Final Year Project -
5
An evolutionary based features construction methods for data summarization approach
Published 2015“…In this work, we empirically compare the predictive accuracies of classification tasks based on the proposed feature construction methods and also the existing feature construction methods. …”
Get full text
Get full text
Research Report -
6
Ant system-based feature set partitioning algorithm for classifier ensemble construction
Published 2016“…In this study, Ant system-based feature set partitioning algorithm for classifier ensemble construction is proposed.The Ant System Algorithm is used to form an optimal feature set partition of the original training set which represents the number of classifiers.Experiments were carried out to construct several homogeneous classifier ensembles using nearest mean classifier, naive Bayes classifier, k-nearest neighbor and linear discriminant analysis as base classifier and majority voting technique as combiner. …”
Get full text
Get full text
Get full text
Article -
7
Knowledge base processing method based on text classification algorithm
Published 2023“…The text classification algorithm's knowledge base processing method utilizes existing data from the knowledge base to guide the construction and training of the classification model. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis -
9
-
10
Ant colony optimization based subset feature selection in speech processing: Constructing graphs with degree sequences
Published 2024journal::journal article -
11
Risk assessment for safety and health algorithm for building construction in Oman
Published 2015“…Instead, it is suggested that results be verified with an alternative method of assessing risk, such as RASH. In conclusion, RASH is an alternative and effective method for the assessment of safety and health risks in building construction in Oman.…”
Get full text
Get full text
Thesis -
12
Sine-cosine optimization-based bijective substitution-boxes construction using enhanced dynamics of chaotic map
Published 2018“…This paper proposes a novel method of constructing strong substitution-boxes (S-boxes) of order n (4 ≤ n ≤ 8) based on a recent optimization algorithm known as sine-cosine algorithm (SCA). …”
Get full text
Get full text
Get full text
Article -
13
Sequential constructive algorithm incorporate with fuzzy logic for solving real world course timetabling problem
Published 2020“…Sequential constructive algorithm is one of the popular methods for solving timetabling problems. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
A variant fisher and Jaikuamr algorithm to solve capacitated vehicle routing problem
Published 2017“…Route generation is a traveling sales man problem (TSP) and any TSP optimization method is useful for this purpose. Fisher and Jaikumar algorithm is a well-known cluster based method which creates clusters with a geometric method partitioning the customer plane into equal angular cones where the total cones are equal to the number of vehicles. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
15
Optimized feature construction methods for data summarizations of relational data
Published 2014“…In this thesis, novel feature construction methods are introduced and a question of whether or not the descriptive accuracy of the summarized data can benefit from the novel feature construction methods is investigated. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
Sequential Constructive Algorithm incorporate with Fuzzy Logic for Solving Real World Course Timetabling Problem
Published 2020“…Sequential constructive algorithm is one of the popular methods for solving timetabling problems. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Book -
18
A Data Mining Approach to Construct Graduates Employability Model in Malaysia
Published 2024Get full text
Article -
19
Aco-based feature selection algorithm for classification
Published 2022“…The modified graph clustering ant colony optimisation (MGCACO) algorithm is an effective FS method that was developed based on grouping the highly correlated features. …”
Get full text
Get full text
Thesis -
20
A reliable time base routing framework with seamless networking operation for SDN / Nauman Khan
Published 2024“…PMTRF modules and their algorithms enable the isolation of the maintenance switch and the selection of the most reliable path for future affected flows based on input time provided by the administrator. …”
Get full text
Get full text
Get full text
Thesis
