Search Results - (( its application during algorithm ) OR ( _ applications usage algorithm ))*
Search alternatives:
- application during »
- applications usage »
- during algorithm »
- its application »
- usage algorithm »
- _ applications »
-
1
Agro-ento bioinformation: towards the edge of reality
Published 2002“…The protocols range from the molecular levels to domains of larger dimensions such as those encompassing fraternities of politics and policies, and societal applications. These protocols, algorithms, and visualisations undergo dynamic incubation processes to produce the end product, which is bioinformation. …”
Get full text
Get full text
Inaugural Lecture -
2
-
3
Energy-efficient handover algorithm for Bluetooth network
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Reactive power imbalance method for islanding detection in micro-grid operation
Published 2014“…Its major function is to ensure the stable operation during the fault and a variety of utility grid disruption. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Evaluation of UDP-based reliable transport protocols in wireless network: article / Madzirin Masirap
Published 2014“…The idea of wireless networking is interesting mainly because it introduce portability. For IoT application that require near real-time wireless connection, the traditional TCP protocol is not suitable because of its packet header size and its conservative Additive Increase Multiplicative Decrease (AIMD) congestion control algorithm and slow start strategy. …”
Get full text
Get full text
Article -
7
Evaluation of UDP-based reliable transport protocols in wireless network / Madzirin Masirap
Published 2014“…The idea of wireless networking is interesting mainly because it introduce portability. For IoT application that require near real-time wireless connection, the traditional TCP protocol is not suitable because of its packet header size and its conservative Additive Increase Multiplicative Decrease (AIMD) congestion control algorithm and slow start strategy. …”
Get full text
Get full text
Thesis -
8
Image Segmentation using Enhanced K-means Clustering with Hybrid Image Filtering for Acute Leukemia Blood Cells Microscopic Images
Published 2024thesis::master thesis -
9
Cache replacement algorithm using hierarchical allocation scheduling
Published 2014Get full text
Get full text
Thesis -
10
-
11
-
12
Development of Hexapod Robot with Manoeuvrable Wheel
Published 2012Get full text
Get full text
Get full text
Article -
13
Embedded vision system development using 32-bit Single Board Computer and GNU/Linux
Published 2011“…The image processing algorithm includes color space conversion and motion analysis technique. …”
Get full text
Thesis -
14
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
Published 2005“…The objective of this paper is to describe a rough sets and fuzzy c-means algorithms and discuss its usage to detect intrusion in a computer network. …”
Get full text
Get full text
Get full text
Article -
15
DATDroid : Dynamic Analysis Technique in Android Malware Detection
Published 2020“…During the classification 70% of the dataset was allocated for training phase and 30% for testing phase using machine learning algorithm. …”
Get full text
Get full text
Get full text
Article -
16
Mining Of Resource Usage Using Evoc Algorithm In Grid Environment.
Published 2007Get full text
Get full text
Conference or Workshop Item -
17
-
18
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Get full text
Thesis -
19
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…Online prediction is one Web Usage Mining application. However, the accuracy of the prediction and classification in the current architecture of predicting users' future requests systems can not still satisfy users especially in huge Web sites. …”
Get full text
Get full text
Article -
20
A MODIFIED PARTICLE SWARM OPTIMIZATION ALGORITHM FOR WELLBORE TRAJECTORY DESIGN
Published 2021“…A lot of modifications to the original metaheuristic methods were made during previous applications, which primarily improve the exploration capability of original algorithms keeping exploitation capability unaddressed. …”
Get full text
Get full text
Thesis
