Search Results - (( some application among algorithm ) OR ( based application need algorithm ))*
Search alternatives:
- application among »
- based application »
- some application »
- application need »
- among algorithm »
- need algorithm »
-
1
Fsm-Based Enhanced March C- Algorithm For Memory Built-In Self-Test
Published 2017Get full text
Get full text
Thesis -
2
African Buffalo Optimization Algorithm Based T-Way Test Suite Generation Strategy for Electronic-Payment Transactions
Published 2021“…Experi-mental procedures indicate that the hybridization of the ABO with these algorithmic com-ponents led to faster convergence and greater effectiveness superior to the outcomes of existing techniques, thereby placing the algorithm among the best when compared with other methods/techniques.…”
Get full text
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
African buffalo optimization algorithm based t-way test suite generation strategy for electronic-payment transactions
Published 2022“…Experimental procedures indicate that the hybridization of the ABO with these algorithmic components led to faster convergence and greater effectiveness superior to the outcomes of existing techniques, thereby placing the algorithm among the best when compared with other methods/techniques.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks
Published 2000“…Some of these algorithms do not measure the actual ABR traffic load which leads to either overestimates or underestimates of the bandwidth allocation. …”
Get full text
Get full text
Thesis -
5
AUTOMATED MALARIA PARASITE QUANTIFICATION OF THIN BLOOD SMEAR
Published 2013Get full text
Get full text
Final Year Project -
6
Semantic-Based Scalable Decentralized Resource Discovery
Published 2010“…DA describes resource capabilities, and RA carries resource requests that are needed for some applications. We develop a RD algorithm that optimizes the search of the resources on the network. …”
Get full text
Get full text
Conference or Workshop Item -
7
Semantic-Based Scalable Decentralized Grid Resource Discovery
Published 2009“…DA describes resource capabilities, and RA carries resource requests that are needed for some applications. We develop a RD algorithm that optimizes the search of the resources on the network. …”
Get full text
Get full text
Conference or Workshop Item -
8
-
9
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…AI algorithms rely on data or information to learn, analyze, and reach conclusions. …”
Get full text
Get full text
Get full text
Article -
10
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…AI algorithms rely on data or information to learn, analyze, and reach conclusions. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
11
Seamless horizontal handover algorithm for homogeneous wireless mobile networks using fuzzy logic
Published 2013“…One of the main challenges for robust mobility is the availability of simple and seamless handover algorithms, which allow a mobile node to connect among homogeneous or heterogeneous wireless networks. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
Published 2017“…Visual Studio has been used in order to code the program in C#. In addition, some research has been made through observation as well as referring to the published materials and the existing application of fingerprint and Raspberry Pi. …”
Get full text
Get full text
Thesis -
13
Danger theory metaphor in artificial immune system for system call data
Published 2006“…Artificial Immune System (AIS) is a naive paradigm in biologically inspired computation; artificial neural networks (ANNs) and genetic algorithms (GAs) are among popular examples in this domain. …”
Get full text
Get full text
Thesis -
14
Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
Published 2017“…It employs multi-level detection based on identity and position verification. Then, a trust algorithm is applied based on the energy of each sensor node. …”
Get full text
Get full text
Get full text
Article -
15
Design of photonic band gap aperture coupled fractal shape tri-band active antenna
Published 2014“…Based on these three different frequencies, an antenna can be developed to resonate at these three frequencies with high performances like high gain and being applicable for the application related to this band (ISM). …”
Get full text
Get full text
Thesis -
16
Real-time driving monitoring system for new drivers using 360° camera with raspberry PI
Published 2020Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Gesture recognition system for Nigerian tribal greeting postures using support vector machine / Segun Aina …[et al.]
Published 2020“…This research used a moment-based feature extraction algorithm to extract shape features that were passed as input to SVM. …”
Get full text
Get full text
Get full text
Article -
18
Relationship between tiktok usage and youth well-being involving personality characteristics
Published 2022“…By creating a content ecology and recommendation power through algorithms, TikTok enables users with similar interests to expand their social relationships through content sharing, becoming a key trend in social media video applications in China. …”
Get full text
Get full text
Thesis -
19
-
20
