Search Results - (( some applications means algorithm ) OR ( its application during algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3

    Denoising of digital images using second generation wavelet transforms-hidden markov model by Khmag, Asem Ib Mohamed

    Published 2016
    “…Due to the lack of translation invariance in the wavelet basis function, some artifacts may appear after applying the denoising algorithm. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Modelling of river flow using particle swarm optimized cascade-forward neural networks: A case study of kelantan river in malaysia by Hayder G., Solihin M.I., Mustafa H.M.

    Published 2023
    “…Additionally, the developed nonlinear multivariable regression model using CFNNPSO produced acceptable prediction accuracy during model testing with the regression coefficient (R2), root mean square error (RMSE), and mean of percentage error (MPE) of 0.88, 191.1 cms and 0.09%, respectively. …”
    Article
  5. 5
  6. 6

    Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks by Mubarak, Mohammed Awadh Ahmed Ben

    Published 2013
    “…This enables it to meet the MS application requirements based on some criteria such as CINR, BW, and delay. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Monitoring and assessment of weld penetration condition during pulse mode laser welding using air-borne acoustic signal by Mohd Fadhlan, Mohd Yusof

    Published 2021
    “…To develop the signal processing algorithm, multi-lag phase space (MLPS) method was adopted in which some modifications on its original algorithm were made by introducing the localized crest factor (CF) thresholding method to reduce the influence of noise. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    An e-voting application using cryptography technology by Chin, Hsin Tien

    Published 2020
    “…HTTPS communication protocol is encrypted using Transport Layer Security (TLS) or its predecessor, Secure Sockets Layer (SSL). In this system, SSLcertificate was applied to create an encrypted connection and establish trust to the web application. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System by Hassan, Mahamat. I, Azween, Abdullah

    Published 2010
    “…Each class has a head, which is elected among its own class nodes/members. Head plays the role of a registry in its class and communicates with the other heads of the classes in a peer to peer manner during the discovery process. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System by HASSAN, MAHAMAT ISSA

    Published 2010
    “…Each class has a head, which is elected among its own class I nodes/members. Head plays the role of a registry in its class and communicates with I the other heads of the classes in a peer to peer manner during the discovery process. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan by Aznan, Muhammad Nur Syazwanie Aznan

    Published 2019
    “…Which is why this project objective is to develop a web based clustering tool using K-MEAN++ algorithm. This project will use the rapid application development (RAD) methodology since this are the most suitable method for developing the system. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A Mobile Application For Stock Price Prediction by Choy, Yi Tou

    Published 2021
    “…The evaluation methods were Root Mean Square Error and Mean Absolute Error. The results show ARIMA has the least error among all five prediction algorithms. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms by Raheem, Ajiboye Adeleke, Hauwau, Isah-Kebbe, O., Oladele Tinuke

    Published 2014
    “…Exploring the dataset features through the application of clustering algorithms is a viable means by which the conceptual description of such data can be revealed for better understanding, grouping and decision making. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20