Search Results - (( some applications usage algorithm ) OR ( its applications using algorithm ))
Search alternatives:
- applications usage »
- applications using »
- some applications »
- its applications »
- usage algorithm »
- using algorithm »
-
1
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
Published 2006“…The interaction of different traffic type flows in a DiffServ networks using the proposed integration model between FWFQ and the dual token bucket shaper algorithm is analyzed. …”
Get full text
Get full text
Thesis -
2
The Performance of Chlorophyll-a Distribution Estimation by Using Ratio Algorithm on Landsat-8 in Sungai Merbok Estuary / Jesse Vince Rabing ... [et al.]
Published 2022“…However, some algorithms usages are limited to spatial, temporal, and other factors, hence the performance evaluation of algorithms developed are indeed important for robust observation and monitoring purposes. …”
Get full text
Get full text
Get full text
Article -
3
Particle swarm optimization for neural network learning enhancement
Published 2006Get full text
Get full text
Thesis -
4
Bio-inspired computation: Recent development on the modifications of the cuckoo search algorithm
Published 2017“…Presently, the Cuckoo Search algorithm is attracting unprecedented attention from the research community and applications of the algorithm are expected to increase in number rapidly in the future. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Differential evolution for neural networks learning enhancement
Published 2008“…These algorithms can be used successfully in many applications requiring the optimization of a certain multi-dimensional function. …”
Get full text
Get full text
Get full text
Thesis -
6
Efficient task scheduling strategies using symbiotic organisms search algorithm for cloud computing environment
Published 2022“…The SOS and its variants Discrete Symbiotic Organisms Search (DSOS) algorithm have been used to solve different optimisation problems including tasks scheduling in cloud computing environment where results obtained are promising in comparison with stateof- the-art metaheuristic algorithms. …”
Get full text
Get full text
Thesis -
7
Mr image volume segmentation using neuro-fuzzy method / Ahmad Safwan Mohamed Makki
Published 2003“…While manual segmentation is often regarded as a gold standard, its usage is not acceptable in some clinical situations. …”
Get full text
Get full text
Thesis -
8
Bayesian Framework based Brain Source Localization Using High SNR EEG Data
Published 2019“…The multipurpose application of brain source localization in the domain of biomedical engineering has aggrandized the ways for its further development for various healthcare applications. …”
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Image Segmentation using Enhanced K-means Clustering with Hybrid Image Filtering for Acute Leukemia Blood Cells Microscopic Images
Published 2024thesis::master thesis -
11
Relationship between tiktok usage and youth well-being involving personality characteristics
Published 2022“…TikTok, as one of several social media applications, has attracted numerous users, particularly youths, due to its short and fast video features. …”
Get full text
Get full text
Thesis -
12
Speaker recognition using neural network
Published 2012“…The feature for the speaker who has to be identified are extracted and compared with the stored templates by using Backpropagation Algorithm. After that, the trained network corresponds to the output meanwhile the input is the extracted features of the speaker are identified. …”
Get full text
Get full text
Undergraduates Project Papers -
13
Achieving security by combining Huffman and SLSB algorithms
Published 2013Get full text
Get full text
Get full text
Article -
14
-
15
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…But the major treat of the IPSec is caused by the usage or the algorithm that has weak keys. The algorithms are DES, 3DES, Blowfish, Cast128 and RC5. …”
Get full text
Get full text
Conference or Workshop Item -
16
-
17
E-Hadith DV: Hadith scriptures in Syafie Madhhab retrieval using data visualization / Nor Faezahtul Salme Norhisam
Published 2020“…Implementation of sentence-based searching and the usage of the stemming algorithm would be considered to produce more meaningful results for future work.…”
Get full text
Get full text
Thesis -
18
Shuffling algorithms for automatic generator question paper system.
Published 2010Get full text
Get full text
Article -
19
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…There are four experiment conducted such as processing time, power usage, memory usage and data modification attack. …”
Get full text
Get full text
Thesis -
20
