Search Results - (( its application drops algorithm ) OR ( its application ((a algorithm) OR (_ algorithm)) ))*

Refine Results
  1. 1
  2. 2

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…In addition, with regard to the second algorithm SNBR, the results show that SNBR overcomes the NCPR algorithm terms of normalize routing overhead by 58.80% as its due to its dropping factor. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    Simulated Kalman Filter algorithms for solving optimization problems by Nor Hidayati, Abdul Aziz

    Published 2019
    “…Its optimality has inspired the development of a metaheuristic algorithm called Heuristic Kalman Algorithm (HKA) in 2009. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…Because it is a wireless technology, in which resources are limited such as bandwidth and power; how to manage these resources while maintaining QoS to diverse applications become a critical issue. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Efficient task scheduling strategies using symbiotic organisms search algorithm for cloud computing environment by Sa'ad, Suleiman

    Published 2022
    “…Users are charged based on their resources usage as well as Quality of Service (QoS) desired due to its pay-as-you-go feature. As such, task scheduling approaches play a vital role in specifying and ensuring an adequate set of resources to execute the users’ applications (i.e., tasks). …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13
  14. 14

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…This thesis implements the algorithms for the Methods of CPM, BPBM fractal coding, and its application. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Cloud-based lightweight detection of hardhat compliance based on YOLOv5 in power construction site by Wanbo, Luo

    Published 2025
    “…Experimental results demonstrate that the hardhat-YOLO model can accurately and efficiently detect hardhat-wearing compliance in real-time, ensuring its practical applicability in power workplace safety monitoring.…”
    Get full text
    Get full text
    Thesis
  16. 16

    Blind Source Separation Using Two-Dimensional Nonnegative Matrix Factorization In Biomedical Field by Toh, Cheng Chuan

    Published 2018
    “…Blind Source Separation (BSS) refers to the statistical technique of separating a mixture of underlying source signals.BSS denotes as a phenomena and separation on mixed heart-lung sound is one of its example.The challenge of this research is to separate the separate lung sound and heart sound from mixed heart-lung sound.A clear lung sound for diagnosis purpose able to be obtained after separating the mixed heart-lung sound.In biomedical field,lung information is precious due to it has been provided for respiratory diagnosis.However,the interference of heart sound towards lung sound will generate ambiguity and it will lead to drop down the accuracy of diagnosis.Thus,a clean lung sound is needed to increases the accuracy of diagnosis.One of the ways for non-invasive respiratory diagnosis for obtaining lung information is through extracting lung sound from mixed heart-lung sound by using Two-Dimensional Nonnegative Matrix Factorization (NMF2D) algorithm.This method is based on cocktail party effect in which it refers to human brain able to selectively listen to target among a cacophony of conversations and background noise and this considered as a difficult task to machine.Therefore, duplication on cocktail party effect into machine is used to separate the mixed heart-lung sound.This research presents a novel approach NMF2D algorithm in which a suitable model for signal mixture that accommodated the reverberations and nonlinearity of the signals.The objectives of this research are focusing on investigating the useful signal analysis algorithms,defining a new technique of signal separability,designing and developing novel methods for BSS. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Development of predictive modeling and deep learning classification of taxi trip tolls by Al-Shoukry, Suhad, M. Jawad, Bushra Jaber, Zalili, Musa, Sabry, Ahmad H.

    Published 2022
    “…Using a classification algorithm, it is possible to extract drop-off and pickup locations from taxi trip data and estimate if the tour would incur tolls. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Effects of Authentication of Users in Mobile Internet Protocol Version 6 by Obenofunde, Simon Tabi

    Published 2004
    “…A password algorithm is proposed from which a program can be written in any language deemed suitable.…”
    Get full text
    Get full text
    Thesis