Search Results - (( some application a algorithm ) OR ( its application among algorithm ))*

Refine Results
  1. 1
  2. 2

    Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks by Mohamed, Mohamed Awad Elshaikh

    Published 2006
    “…In this thesis, I2tswTCM is proposed as an enhanced version of the famous tswTCM marker scheme used in the current DiffServ architecture, this new algorithm improves fairness in the excess bandwidth among different aggregates in a DiffServ networks and it has a better fairness than all other algorithms for different network provision levels. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A novel N-input voting algorithm for X-by-wire fault-tolerant systems by Karimi, Abbas, Zarafshan, Faraneh, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ramli, Abdul Rahman

    Published 2014
    “…In this paper, a novel voting algorithm is introduced for real-time fault-tolerant control systems, appropriate for applications in which N is large. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    A novel swarm-based optimisation algorithm inspired by artificial neural glial network for autonomous robots by Ismail, Amelia Ritahani, Tumian, Afidalina

    Published 2019
    “…Several areas of engineering have adopted the idea that swarms can solve complex problems and some of them are described in [13]. Some of the examples highlighted by [13] are a combinatorial optimisation, routing communications network, as well as solving robotics applications. …”
    Get full text
    Get full text
    Monograph
  5. 5

    The Performance of Chlorophyll-a Distribution Estimation by Using Ratio Algorithm on Landsat-8 in Sungai Merbok Estuary / Jesse Vince Rabing ... [et al.] by Rabing, Jesse Vince, Abd.Aziz, Khairul Naim, Kamaruddin, Sharir Aizat, Roslani, Muhammad Akmal, Tajam, Jamil, Ahmad, Aziani, Nazri, Rosnani, Zainol, Zamzila Erdawati, Ramli, Rohayu, Shaari, Mohd Idrus

    Published 2022
    “…This study explores the applicability of ratio algorithms for estimation of the chl- a concentration at Sungai Merbok by assessing chl-a distribution pattern built by the algorithms and evaluating each algorithm for their errors compared to in-situ data. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Spatial network k-Nearest neighbor: A survey and future directives by Borhanuddin B., Solemon B.

    Published 2023
    “…There are many types of nearest neighbor algorithms. One of them is called k-nearest neighbor (k- NN), a technique that helps to find number of k closest objects from a user location within a specified range of area. k- NN road network algorithm studies have been through various query performance discussions. …”
    Conference Paper
  7. 7
  8. 8
  9. 9

    Content-based recommender system for an academic social network / Vala Ali Rohani by Vala Ali, Rohani

    Published 2014
    “…The algorithm exploits all interests and preferences in a hierarchy tree structure. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Denoising of digital images using second generation wavelet transforms-hidden markov model by Khmag, Asem Ib Mohamed

    Published 2016
    “…In this issue, a newly developed algorithm based on second-generation wavelet transformation using semi-soft thresholding is introduced. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    An Evolutionary Stream Clustering Technique for Outlier Detection by Supardi, N.A., Abdulkadir, S.J., Aziz, N.

    Published 2020
    “…Most of the traditional density-based clustering is not applicable in data streams due to its own characteristics. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Dynamic area coverage algorithms for static and mobile wireless sensor network environments using voronoi techniques by Ceesay, Omar M.

    Published 2011
    “…Each static node then checks whether there exist a region in its polygon without coverage. If a coverage-hole is found, static nodes compute the size of the hole and request mobile nodes to target locations for optimal coverage. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Advance video analysis system and its applications by Ali, Md. Hazrat, Shafie, Amir Akramin, Hafiz, Fadhlan, Mat Ali, Roslizar

    Published 2010
    “…It recognizes activities in an application environment, such as in a room, supermarket, car, or security checkpoint. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20