Search Results - (( some applications usage algorithm ) OR ( its application _ algorithm ))

Refine Results
  1. 1

    Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks by Mohamed, Mohamed Awad Elshaikh

    Published 2006
    “…This thesis investigates the effect of different scheduling mechanisms and usage of a different marker algorithms then develop and implement a fair scheduling mechanism and integrate it with a shaper with the usage of a very fair efficient marker at the edge of the DiffServ networks with the usage of simulation and analytical techniques. …”
    Get full text
    Get full text
    Thesis
  2. 2

    The Performance of Chlorophyll-a Distribution Estimation by Using Ratio Algorithm on Landsat-8 in Sungai Merbok Estuary / Jesse Vince Rabing ... [et al.] by Rabing, Jesse Vince, Abd.Aziz, Khairul Naim, Kamaruddin, Sharir Aizat, Roslani, Muhammad Akmal, Tajam, Jamil, Ahmad, Aziani, Nazri, Rosnani, Zainol, Zamzila Erdawati, Ramli, Rohayu, Shaari, Mohd Idrus

    Published 2022
    “…However, some algorithms usages are limited to spatial, temporal, and other factors, hence the performance evaluation of algorithms developed are indeed important for robust observation and monitoring purposes. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Bio-inspired computation: Recent development on the modifications of the cuckoo search algorithm by Haruna, Chiroma, Herawan, Tutut, Iztok, Fister Jr, Iztok, Fister, Abdulkareem, Sameem, Shuib, Liyana, Mukhtar, Fatihu Hamza, Younes, Saadi, Abubakar, Adamu

    Published 2017
    “…Presently, the Cuckoo Search algorithm is attracting unprecedented attention from the research community and applications of the algorithm are expected to increase in number rapidly in the future. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Reactive power imbalance method for islanding detection in micro-grid operation by Shamshiri, Meysam, Sapar, Ahmad Farid, Chin, Kim Gan, Tengga Daram, Revinnath, Ab Ghani, Mohd Ruddin

    Published 2014
    “…The passive algorithm implements in this paper due to the low cost operation, however it got the higher non-detection zone (NDZ) and slower response time compare some active methods. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Differential evolution for neural networks learning enhancement by Ismail Wdaa, Abdul Sttar

    Published 2008
    “…These algorithms can be used successfully in many applications requiring the optimization of a certain multi-dimensional function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Efficient task scheduling strategies using symbiotic organisms search algorithm for cloud computing environment by Sa'ad, Suleiman

    Published 2022
    “…Users are charged based on their resources usage as well as Quality of Service (QoS) desired due to its pay-as-you-go feature. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Mr image volume segmentation using neuro-fuzzy method / Ahmad Safwan Mohamed Makki by Ahmad Safwan, Mohamed Makki

    Published 2003
    “…While manual segmentation is often regarded as a gold standard, its usage is not acceptable in some clinical situations. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Bayesian Framework based Brain Source Localization Using High SNR EEG Data by Jatoi, M.A., Kamel, N., Gaho, A.A., Dharejo, F.A.

    Published 2019
    “…The multipurpose application of brain source localization in the domain of biomedical engineering has aggrandized the ways for its further development for various healthcare applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Relationship between tiktok usage and youth well-being involving personality characteristics by Tang, Lian

    Published 2022
    “…TikTok, as one of several social media applications, has attracted numerous users, particularly youths, due to its short and fast video features. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Speaker recognition using neural network by Zul Rasyied, Ab. Rasat

    Published 2012
    “…Mostly, years by years there have been several techniques being developed to achieve high success rate of accuracy in the identification and verification of individuals for authentication in security systems. A major application area of such systems would be providing security for telephone-mediated transaction systems where some form of anatomical or "biometric" identification is desirable. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15
  16. 16
  17. 17
  18. 18

    Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof by Md Taujuddin, Nik Shahidah Afifi, Abdullah, Abdul Hanan, Maarof, Mohd Aizaini

    Published 2006
    “…But the major treat of the IPSec is caused by the usage or the algorithm that has weak keys. The algorithms are DES, 3DES, Blowfish, Cast128 and RC5. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    E-Hadith DV: Hadith scriptures in Syafie Madhhab retrieval using data visualization / Nor Faezahtul Salme Norhisam by Norhisam, Nor Faezahtul Salme

    Published 2020
    “…Implementation of sentence-based searching and the usage of the stemming algorithm would be considered to produce more meaningful results for future work.…”
    Get full text
    Get full text
    Thesis