Search Results - (( some applications usage algorithm ) OR ( its applications using algorithm ))

Refine Results
  1. 1

    Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks by Mohamed, Mohamed Awad Elshaikh

    Published 2006
    “…The interaction of different traffic type flows in a DiffServ networks using the proposed integration model between FWFQ and the dual token bucket shaper algorithm is analyzed. …”
    Get full text
    Get full text
    Thesis
  2. 2

    The Performance of Chlorophyll-a Distribution Estimation by Using Ratio Algorithm on Landsat-8 in Sungai Merbok Estuary / Jesse Vince Rabing ... [et al.] by Rabing, Jesse Vince, Abd.Aziz, Khairul Naim, Kamaruddin, Sharir Aizat, Roslani, Muhammad Akmal, Tajam, Jamil, Ahmad, Aziani, Nazri, Rosnani, Zainol, Zamzila Erdawati, Ramli, Rohayu, Shaari, Mohd Idrus

    Published 2022
    “…However, some algorithms usages are limited to spatial, temporal, and other factors, hence the performance evaluation of algorithms developed are indeed important for robust observation and monitoring purposes. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Bio-inspired computation: Recent development on the modifications of the cuckoo search algorithm by Haruna, Chiroma, Herawan, Tutut, Iztok, Fister Jr, Iztok, Fister, Abdulkareem, Sameem, Shuib, Liyana, Mukhtar, Fatihu Hamza, Younes, Saadi, Abubakar, Adamu

    Published 2017
    “…Presently, the Cuckoo Search algorithm is attracting unprecedented attention from the research community and applications of the algorithm are expected to increase in number rapidly in the future. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Differential evolution for neural networks learning enhancement by Ismail Wdaa, Abdul Sttar

    Published 2008
    “…These algorithms can be used successfully in many applications requiring the optimization of a certain multi-dimensional function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Efficient task scheduling strategies using symbiotic organisms search algorithm for cloud computing environment by Sa'ad, Suleiman

    Published 2022
    “…The SOS and its variants Discrete Symbiotic Organisms Search (DSOS) algorithm have been used to solve different optimisation problems including tasks scheduling in cloud computing environment where results obtained are promising in comparison with stateof- the-art metaheuristic algorithms. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Mr image volume segmentation using neuro-fuzzy method / Ahmad Safwan Mohamed Makki by Ahmad Safwan, Mohamed Makki

    Published 2003
    “…While manual segmentation is often regarded as a gold standard, its usage is not acceptable in some clinical situations. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Bayesian Framework based Brain Source Localization Using High SNR EEG Data by Jatoi, M.A., Kamel, N., Gaho, A.A., Dharejo, F.A.

    Published 2019
    “…The multipurpose application of brain source localization in the domain of biomedical engineering has aggrandized the ways for its further development for various healthcare applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10
  11. 11

    Relationship between tiktok usage and youth well-being involving personality characteristics by Tang, Lian

    Published 2022
    “…TikTok, as one of several social media applications, has attracted numerous users, particularly youths, due to its short and fast video features. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Speaker recognition using neural network by Zul Rasyied, Ab. Rasat

    Published 2012
    “…The feature for the speaker who has to be identified are extracted and compared with the stored templates by using Backpropagation Algorithm. After that, the trained network corresponds to the output meanwhile the input is the extracted features of the speaker are identified. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13
  14. 14
  15. 15

    Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof by Md Taujuddin, Nik Shahidah Afifi, Abdullah, Abdul Hanan, Maarof, Mohd Aizaini

    Published 2006
    “…But the major treat of the IPSec is caused by the usage or the algorithm that has weak keys. The algorithms are DES, 3DES, Blowfish, Cast128 and RC5. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17

    E-Hadith DV: Hadith scriptures in Syafie Madhhab retrieval using data visualization / Nor Faezahtul Salme Norhisam by Norhisam, Nor Faezahtul Salme

    Published 2020
    “…Implementation of sentence-based searching and the usage of the stemming algorithm would be considered to produce more meaningful results for future work.…”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…There are four experiment conducted such as processing time, power usage, memory usage and data modification attack. …”
    Get full text
    Get full text
    Thesis
  20. 20