Search Results - (( its application testing algorithm ) OR ( some application during algorithms ))

Refine Results
  1. 1

    Water level forecasting using feed forward neural networks optimized by African Buffalo Algorithm (ABO) by Ahmed, Ehab Ali

    Published 2019
    “…These algorithms have succeeded with different accuracy levels, but it is still suffering from some weaknesses. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4
  5. 5

    Denoising of digital images using second generation wavelet transforms-hidden markov model by Khmag, Asem Ib Mohamed

    Published 2016
    “…Due to the lack of translation invariance in the wavelet basis function, some artifacts may appear after applying the denoising algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation by Chen, Soong Der

    Published 2000
    “…A popular software-driven media processing's technology - MMXTM was studied for its application in 2-D 8x8 DCI. The above studies and reviews provide two proposals for improvements. …”
    Get full text
    Get full text
    Thesis
  7. 7

    An enhanced mobile internet protocol version 6 (IPv6) with multicast function and hierarchical design. by Khatun, Sabira

    Published 2006
    “…Mobile IPv6 mechanism requires some handover algorithm when it changes its point of attachment in the Internet.An enhanced micro mobility handover algorithm is developed on top of mobile IPv6. …”
    Get full text
    Patent
  8. 8
  9. 9
  10. 10

    Modelling of river flow using particle swarm optimized cascade-forward neural networks: A case study of kelantan river in malaysia by Hayder G., Solihin M.I., Mustafa H.M.

    Published 2023
    “…The constructed modelling procedure can be adopted for future applications. � 2020 by the authors. Licensee MDPI, Basel, Switzerland.…”
    Article
  11. 11
  12. 12

    Runtime pluggable CPU scheduler for linux operating system by Al-Maweri, Nasr Addin Ahmed Salem

    Published 2010
    “…The CPU scheduler uses different scheduling policies (algorithms) to manage such processes. Each scheduling policy has its own properties and suits specific applications or a specific environment. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A review of slicing techniques in software engineering by Shah, Asadullah, Raza, Ali, Hassan, Basri, Shah, Abdul Salam

    Published 2015
    “…Program slice is the part of program that may take the program off the path of the desired output at some point of its execution. Such point is known as the slicing criterion. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14
  15. 15
  16. 16

    Preserving the confidentiality of final examination question paper using image steganography technique / Aviefieorennia Tompell by Tompell, Aviefieorennia

    Published 2016
    “…Thus, this project emphasize strongly on developing a desktop based application that can hide final examination question paper in a digital bitmap cover image by using Image Steganography technique intended for the use of lecturer during the preparation of final examination question paper. …”
    Get full text
    Get full text
    Student Project
  17. 17

    An e-voting application using cryptography technology by Chin, Hsin Tien

    Published 2020
    “…HTTPS communication protocol is encrypted using Transport Layer Security (TLS) or its predecessor, Secure Sockets Layer (SSL). In this system, SSLcertificate was applied to create an encrypted connection and establish trust to the web application. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18
  19. 19

    Gene expression profiling of human bronchial smooth muscle and lung fibroblasts cells stimulated with IL-1B, IL-4, IL-5 and IL-13 cytokines through the application of cDNA microar... by Jaafar, Faizah

    Published 2011
    “…Microarray data was generated by using third party software. Two algorithms were chosen to summarize the data; RMA and PLIER. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Development of an automated detector and counter for bagworm census by Ahmad, Mohd Najib

    Published 2020
    “…The development of an image processing algorithm for detection and counting of Metisa plana Walker, a species of Malaysia’s local bagworm using image segmentation was proposed as it was found to be better than the thermal approach after some preliminary field tests. …”
    Get full text
    Get full text
    Thesis