Search Results - (( some application among algorithm ) OR ( its application using algorithm ))*
Search alternatives:
- application among »
- some application »
- among algorithm »
- its application »
- using algorithm »
-
1
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
Published 2006“…In this thesis, I2tswTCM is proposed as an enhanced version of the famous tswTCM marker scheme used in the current DiffServ architecture, this new algorithm improves fairness in the excess bandwidth among different aggregates in a DiffServ networks and it has a better fairness than all other algorithms for different network provision levels. …”
Get full text
Get full text
Thesis -
2
The Performance of Chlorophyll-a Distribution Estimation by Using Ratio Algorithm on Landsat-8 in Sungai Merbok Estuary / Jesse Vince Rabing ... [et al.]
Published 2022“…The presence of phytoplankton in the water is important as the primary food source of various aquatic lives as well as to determine its pollution level. Among many, the ratio algorithm is one of the approaches in remote sensing used to detect chlorophyll-a in the phytoplankton for its distribution and monitoring. …”
Get full text
Get full text
Get full text
Article -
3
A novel swarm-based optimisation algorithm inspired by artificial neural glial network for autonomous robots
Published 2019“…Several areas of engineering have adopted the idea that swarms can solve complex problems and some of them are described in [13]. Some of the examples highlighted by [13] are a combinatorial optimisation, routing communications network, as well as solving robotics applications. …”
Get full text
Get full text
Monograph -
4
How to Test the Means among Heteroscedastic Normal Populations
Published 1988“…An alternative test is proposed for some heteroscedastic normal populations with constant coefficient of variations. To facilitate the application of the procedure, an efficient estimation algorithm is shown for its means and the corresponding variance-covariance matrix. …”
Get full text
Get full text
Article -
5
-
6
-
7
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…In its formulation, the algorithm considers the interests and preferences of users’ friends and faculty mates in addition to users’ own preferences. …”
Get full text
Get full text
Thesis -
8
Denoising of digital images using second generation wavelet transforms-hidden markov model
Published 2016“…In this issue, a newly developed algorithm based on second-generation wavelet transformation using semi-soft thresholding is introduced. …”
Get full text
Get full text
Thesis -
9
-
10
A survey: Challenges of image segmentation based fuzzy c-means clustering algorithm
Published 2024journal::journal article -
11
-
12
Enhanced weight-based clustering algorithm to provide reliable delivery for VANET safety applications
Published 2019“…This has led to unstable clusters which could affect the timely delivery of safety applications. In this study, enhanced weight-based clustering algorithm (EWCA) was developed to address these challenges. …”
Get full text
Get full text
Article -
13
-
14
Dynamic area coverage algorithms for static and mobile wireless sensor network environments using voronoi techniques
Published 2011“…In recent years, Wireless Sensor Networks (WSNs) have gained significant research attention due to their prospects in various applications. In most application scenarios, good network coverage of the phenomenon of interest has to be maintained in order to transmit the required data to the sink node. …”
Get full text
Get full text
Thesis -
15
Seamless horizontal handover algorithm for homogeneous wireless mobile networks using fuzzy logic
Published 2013“…The most important and society application of WiMAX is the mobile communication. When a mobile station changes its geographical position, it may also need to change its attachment point in the network in order to retain the quality of the connection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
17
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Vehicle routing problem: models and solutions
Published 2008Get full text
Get full text
Get full text
Article -
19
Advance video analysis system and its applications
Published 2010“…Among the main features of this research some are, Event Id, Video Id, and Human Id which give detail information about the events, videos and other tracked objects. …”
Get full text
Get full text
Get full text
Article -
20
