Search Results - (( some applications among algorithm ) OR ( its application ((a algorithm) OR (_ algorithm)) ))*
Search alternatives:
- applications among »
- some applications »
- among algorithm »
- its application »
- a algorithm »
-
1
Fsm-Based Enhanced March C- Algorithm For Memory Built-In Self-Test
Published 2017Get full text
Get full text
Thesis -
2
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
Published 2006“…In this thesis, I2tswTCM is proposed as an enhanced version of the famous tswTCM marker scheme used in the current DiffServ architecture, this new algorithm improves fairness in the excess bandwidth among different aggregates in a DiffServ networks and it has a better fairness than all other algorithms for different network provision levels. …”
Get full text
Get full text
Thesis -
3
The Performance of Chlorophyll-a Distribution Estimation by Using Ratio Algorithm on Landsat-8 in Sungai Merbok Estuary / Jesse Vince Rabing ... [et al.]
Published 2022“…This study explores the applicability of ratio algorithms for estimation of the chl- a concentration at Sungai Merbok by assessing chl-a distribution pattern built by the algorithms and evaluating each algorithm for their errors compared to in-situ data. …”
Get full text
Get full text
Get full text
Article -
4
A novel N-input voting algorithm for X-by-wire fault-tolerant systems
Published 2014“…In this paper, a novel voting algorithm is introduced for real-time fault-tolerant control systems, appropriate for applications in which N is large. …”
Get full text
Get full text
Get full text
Article -
5
A novel swarm-based optimisation algorithm inspired by artificial neural glial network for autonomous robots
Published 2019“…Several areas of engineering have adopted the idea that swarms can solve complex problems and some of them are described in [13]. Some of the examples highlighted by [13] are a combinatorial optimisation, routing communications network, as well as solving robotics applications. …”
Get full text
Get full text
Monograph -
6
Spatial network k-Nearest neighbor: A survey and future directives
Published 2023“…There are many types of nearest neighbor algorithms. One of them is called k-nearest neighbor (k- NN), a technique that helps to find number of k closest objects from a user location within a specified range of area. k- NN road network algorithm studies have been through various query performance discussions. …”
Conference Paper -
7
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…The algorithm exploits all interests and preferences in a hierarchy tree structure. …”
Get full text
Get full text
Thesis -
8
-
9
-
10
Denoising of digital images using second generation wavelet transforms-hidden markov model
Published 2016“…In this issue, a newly developed algorithm based on second-generation wavelet transformation using semi-soft thresholding is introduced. …”
Get full text
Get full text
Thesis -
11
A survey: Challenges of image segmentation based fuzzy c-means clustering algorithm
Published 2024journal::journal article -
12
-
13
-
14
-
15
Enhanced weight-based clustering algorithm to provide reliable delivery for VANET safety applications
Published 2019“…This has led to unstable clusters which could affect the timely delivery of safety applications. In this study, enhanced weight-based clustering algorithm (EWCA) was developed to address these challenges. …”
Get full text
Get full text
Article -
16
Reactive power imbalance method for islanding detection in micro-grid operation
Published 2014“…Micro-grids usage among consumers has become a new attraction due their several of advantage. …”
Get full text
Get full text
Get full text
Article -
17
Dynamic area coverage algorithms for static and mobile wireless sensor network environments using voronoi techniques
Published 2011“…This thesis focuses on developing Voronoi Tessellation-based Coverage Optimization Algorithms for Static and Mobile Wireless Sensor Networks, where a large number of static nodes are supported by few mobile nodes in carrying out the sensing task. …”
Get full text
Get full text
Thesis -
18
An Evolutionary Stream Clustering Technique for Outlier Detection
Published 2020“…Most of the traditional density-based clustering is not applicable in data streams due to its own characteristics. …”
Get full text
Get full text
Conference or Workshop Item -
19
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Article -
20
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Get full text
Article
