Search Results - (( some applications usage algorithm ) OR ( _ application ((a algorithm) OR (based algorithm)) ))
Search alternatives:
- applications usage »
- some applications »
- usage algorithm »
- a algorithm »
-
1
Achieving security by combining Huffman and SLSB algorithms
Published 2013Get full text
Get full text
Get full text
Article -
2
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…But the major treat of the IPSec is caused by the usage or the algorithm that has weak keys. The algorithms are DES, 3DES, Blowfish, Cast128 and RC5. …”
Get full text
Get full text
Conference or Workshop Item -
3
E-Hadith DV: Hadith scriptures in Syafie Madhhab retrieval using data visualization / Nor Faezahtul Salme Norhisam
Published 2020“…Implementation of sentence-based searching and the usage of the stemming algorithm would be considered to produce more meaningful results for future work.…”
Get full text
Get full text
Thesis -
4
Fruit-Fly Based Searching Algorithm For Cooperative Swarming Robotic System
Published 2013“…Using the existing lawnmower methods incur substantial costs in terms of time, accuracy and reliability. Therefore, the usage of a swarming robotic system is proposed. In this thesis, a simple framework and methodology in developing a bio-inspired algorithm for cooperative swarming robotic application has been developed. …”
Get full text
Get full text
Thesis -
5
Noise Cancellation using Selectable Adaptive Algorithm for Speech in Variable Noise Environment
Published 2017“…Some of the teething problems associated in the use of two-sensor noise cancellation systems are the nature of the noise signals—a problem that imposes the use of highly complex algorithms in reducing the noise. …”
Get full text
Get full text
Get full text
Article -
6
MINIMIZATION OF RESOURCE UTILIZATION FOR A REAL-TIME DEPTH-MAP COMPUTATIONAL MODULE ON FPGA
Published 2011“…Depth-map algorithm allows camera system to estimate depth in many applications. …”
Get full text
Get full text
Thesis -
7
Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar
Published 2007“…Through the algorithm, rule-based technique was used. Based on the experiment results, it is proved that the video content adaptation under e-learning environment can be achieved by the algorithms effectively.…”
Get full text
Get full text
Thesis -
8
Optimizing tree planting areas through integer programming and improved genetic algorithm
Published 2012“…The algorithmic solution with some strategies mainly focuses on efficiency. …”
Get full text
Get full text
Thesis -
9
-
10
Differential evolution for neural networks learning enhancement
Published 2008“…Evolutionary computation is the name given to a collection of algorithms based on the evolution of a population toward a solution of a certain problem. …”
Get full text
Get full text
Get full text
Thesis -
11
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…We analyse the solution and compare with a range of well-known algorithms in terms of compression ratio, memory usage, the number of instructions, compression speed and energy consumption. …”
Get full text
Get full text
Get full text
Thesis -
12
Applying SAX-based time series analysis to classify EEG signal using a COTS EEG device
Published 2021“…SAX algorithm changes the original time series data into a symbolic string and perform the discretization by dividing a time series into equal-sized segments. …”
Get full text
Thesis -
13
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
Get full text
Get full text
Thesis -
14
Efficient task scheduling strategies using symbiotic organisms search algorithm for cloud computing environment
Published 2022“…As such, task scheduling approaches play a vital role in specifying and ensuring an adequate set of resources to execute the users’ applications (i.e., tasks). …”
Get full text
Get full text
Thesis -
15
Ranking trapezoidal fuzzy numbers based on set theoretic indices with Hurwicz criterion / Nazirah Ramli
Published 2003“…This study investigates on the development of the NRI and based on that, two observations and three algorithms are created. …”
Get full text
Get full text
Book Section -
16
-
17
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
Published 2006“…This thesis investigates the effect of different scheduling mechanisms and usage of a different marker algorithms then develop and implement a fair scheduling mechanism and integrate it with a shaper with the usage of a very fair efficient marker at the edge of the DiffServ networks with the usage of simulation and analytical techniques. …”
Get full text
Get full text
Thesis -
18
-
19
-
20
Bayesian Framework based Brain Source Localization Using High SNR EEG Data
Published 2019“…The results shows superiority of MSP over classical algorithms. © 2018 IEEE.…”
Get full text
Get full text
Conference or Workshop Item
