Search Results - (( its applications drops algorithm ) OR ( its application system algorithm ))*

Refine Results
  1. 1

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…In addition, with regard to the second algorithm SNBR, the results show that SNBR overcomes the NCPR algorithm terms of normalize routing overhead by 58.80% as its due to its dropping factor. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…Moreover, an improved sleep mode control algorithm has been introduced to reduce the high energy consumption of the standard sleep mode algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment by Perumal, Thinagaran

    Published 2011
    “…Besides, this algorithm provides home users or application developers to implement their own event operators with bespoke syntax for their application purpose by defining cross-events corresponding to the event operators. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    Effects of Authentication of Users in Mobile Internet Protocol Version 6 by Obenofunde, Simon Tabi

    Published 2004
    “…User security in the Internet has generally been well taken care of at the application layer. Judging from the mobility and portability of a mobile terminal and its ability to get connected to the Internet while away from home, it becomes necessary to be sure of who is using that terminal. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Tunable Sub-Nanosecond Ultra Wideband Narrow Pulse Generator For Microwave Imaging by Zalzala, Ali Mahdi Jaafar

    Published 2016
    “…The Narrowband Pulse Generator (NPG) is an essential element of any UWB imaging system and its characteristics partially determine the overall performance of the system. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Fractal coding of bio-metric image for face authentication by Ahadullah, Md

    Published 2021
    “…This thesis implements the algorithms for the Methods of CPM, BPBM fractal coding, and its application. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Modified hybrid median filter for removal of low density random-valued impulse noise in images / Dr. Siti Noraini Sulaiman ... [et al.] by Sulaiman, Siti Noraini, Isa, Iza Sazanita, Hussain, Zakaria, Md Tahir, Nooritawati, Mat Isa, Nor Ashidi

    Published 2017
    “…Impulse Noise (IN) is one of the common noises which are prevalent in noisy communication channels, faulty pixel sensors and memory location. Its affect the accuracy of various image processing applications such as image segmentation, image restoration, image classification and image compression. …”
    Get full text
    Get full text
    Research Reports
  17. 17

    Cloud-based lightweight detection of hardhat compliance based on YOLOv5 in power construction site by Wanbo, Luo

    Published 2025
    “…Experimental results demonstrate that the hardhat-YOLO model can accurately and efficiently detect hardhat-wearing compliance in real-time, ensuring its practical applicability in power workplace safety monitoring.…”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    A new superimposed topology for single phase wireless power transfer / Azman Ab Malik by Ab Malik, Azman

    Published 2018
    “…Hence the development of wireless power transfer is slow and its market potential is still unclear. In order for the wireless power transfer to be beneficial for the lifestyle of community, it should be produced according to specification and its ability to function should be put as priority. …”
    Get full text
    Get full text
    Thesis