Search Results - (( its application usage algorithm ) OR ( _ application ((among algorithm) OR (acs algorithm)) ))
Search alternatives:
- application usage »
- usage algorithm »
- among algorithm »
- acs algorithm »
-
1
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
Published 2006“…This thesis investigates the effect of different scheduling mechanisms and usage of a different marker algorithms then develop and implement a fair scheduling mechanism and integrate it with a shaper with the usage of a very fair efficient marker at the edge of the DiffServ networks with the usage of simulation and analytical techniques. …”
Get full text
Get full text
Thesis -
2
Investigation of various algorithms on multichannel audio compression
Published 2017Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
-
4
A New Mobile Botnet Classification based on Permission and API Calls
Published 2024“…Mostly, it attacks Android due to its popularity and high usage among end users. Every day, more and more malicious mobile applications (apps) with the botnet capability have been developed to exploit end users' smartphones. …”
Proceedings Paper -
5
The Performance of Chlorophyll-a Distribution Estimation by Using Ratio Algorithm on Landsat-8 in Sungai Merbok Estuary / Jesse Vince Rabing ... [et al.]
Published 2022“…This study explores the applicability of ratio algorithms for estimation of the chl- a concentration at Sungai Merbok by assessing chl-a distribution pattern built by the algorithms and evaluating each algorithm for their errors compared to in-situ data. …”
Get full text
Get full text
Get full text
Article -
6
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…As a result, the Energy Efficient Coverage Path Planning (EECPP) algorithm has been proposed. The EECPP is composed of two algorithms: the Stop Point Prediction Algorithm using K-Means, and Path Planning Algorithm using Particle Swarm Optimization. …”
Get full text
Get full text
Get full text
Article -
7
A new mobile botnet classification based on permission and API calls
Published 2024Conference Paper -
8
Multi-label learning based on positive label correlations using predictive apriori
Published 2019“…Along with that, two algorithms have been constructed by capturing the positive correlations where the first algorithm (MLR-PC) captures the positive global correlations and the second algorithm (MLCBA) proposes an adaption of AC algorithm to handle MLC based on the positive local correlations. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Diabetic Retinopathy Detection Model using Hybrid of U-Net and Vision Transformer Algorithms
Published 2024“…Hence, the hybrid approach consisting of combination of both the algorithms demonstrates excellent robustness and generalization which offers a promising application for diabetic retinopathy screening, involving the potential to revolutionize early diagnosis in clinical settings.…”
Get full text
Get full text
Get full text
Get full text
Article -
10
-
11
Mining Web usage using FRS
Published 2018“…Web Usage Mining (WUM) is the application of data mining methods in extracting potentially useful information from web usage data. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Solving fuzzy-facilities layout problem using genetic algorithm
Published 2013Get full text
Get full text
Get full text
Proceeding Paper -
13
Reactive power imbalance method for islanding detection in micro-grid operation
Published 2014“…Micro-grids usage among consumers has become a new attraction due their several of advantage. …”
Get full text
Get full text
Get full text
Article -
14
-
15
The role of youtube in Malaysian university students’ media consumption: a focus on music and platform preferences
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Energy efficiency mechanism using mobile-based fermat's spiral in wireless sensor networks
Published 2011Get full text
Get full text
Get full text
Proceeding Paper -
17
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004Get full text
Get full text
Final Year Project -
18
-
19
Relationship between tiktok usage and youth well-being involving personality characteristics
Published 2022“…TikTok, as one of several social media applications, has attracted numerous users, particularly youths, due to its short and fast video features. …”
Get full text
Get full text
Thesis -
20
