Search Results - (( its application usage algorithm ) OR ( _ application ((acs algorithm) OR (means algorithm)) ))

Refine Results
  1. 1

    Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means by Chimphlee, Witcha, Md. Sap, Mohd. Noor, Abdullah, Abdul Hanan, Chimphlee, Siriporn

    Published 2005
    “…The objective of this paper is to describe a rough sets and fuzzy c-means algorithms and discuss its usage to detect intrusion in a computer network. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway by Nurul Saliha A. Ibrahim, Nurul Saliha A. Ibrahim, Faiz A. Saparudin, Faiz A. Saparudin

    Published 2023
    “…As a result, the Energy Efficient Coverage Path Planning (EECPP) algorithm has been proposed. The EECPP is composed of two algorithms: the Stop Point Prediction Algorithm using K-Means, and Path Planning Algorithm using Particle Swarm Optimization. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Facial image retrieval on semantic features using adaptive mean genetic algorithm by Shnan, Marwan Ali, Rassem, Taha H., Nor Saradatul Akmar, Zulkifli

    Published 2019
    “…Finally, the features are selected using Adaptive Mean Genetic Algorithm (AMGA). In this study, the average PSNR value obtained after applying Wiener filter was 45.29. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. One of its challenges is to develop a highly efficient and scalable method especially when the minimum support threshold gets smaller. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    Unmanned aerial vehicle assisted localization using multi-sensor fusion and ground vehicle approach by Sharif Himmat, Abdelrazig, Zhahir, Amzari, Md Ali, Syaril Azrad, Ahmad, Mohamed Tarmizi

    Published 2022
    “…Previous researches have extensively studied the usage of sensor fusion algorithms to combine the sensors on board of the UAV to improve its localization. …”
    Get full text
    Get full text
    Article
  8. 8

    Quality Of Service Provisioning Scheme For Real-Time Applications in IEEE 802.11 Wireless Local Area Network by Ng, Roger Cheng Yong

    Published 2006
    “…SNT-AC uses an admission control algorithm to restrict flows in and out of the BSS. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Efficient back-off mechanism for multimedia support in IEEE 802.11E by Al-Nuaimi, Aws Ali Shakir

    Published 2012
    “…In addition, the DFA-EDCA algorithm also provides an intra-AC differentiation mechanism to increase the back-off time randomness and achieve discrimination of the same traffic priority on different stations. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12
  13. 13

    Control of direct multi- input multi-output (MIMO) using single-phase matrix converter (SPMC) topology / Mohd Shukri Mohd Ghazali by Mohd Ghazali, Mohd Shukri

    Published 2023
    “…There are numerous studies demonstrating the practical applications of power electronic converters. There are four types of converters, DC-DC, AC-AC, AC-DC, and DC-AC energy conversion. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    Regional precipitation trend analysis at the Langat River Basin, Selangor, Malaysia by Palizdan, Narges, Falamarzi, Yashar, Huang, Yuk Feng, Lee, Teang Shui, Ghazali, Abdul Halim

    Published 2014
    “…However, the application of two methods at this scale showed a significant trend only in the region AC1. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20