Search Results - (( time equalization based algorithm ) OR ( pattern detection path algorithm ))

Refine Results
  1. 1

    Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network by Sama, Najm Us

    Published 2019
    “…In the proposed work, the focused problem is how to reduce the communication energy consumption and to avoid the routing hole problem by optimized routing algorithms. First, a routing hole detection algorithm is proposed prior to designing the routing protocol which decreases about 30 percent energy consumption rate, detection time and detection overhead. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A generalized laser simulator algorithm for optimal path planning in constraints environment by Aisha, Muhammad

    Published 2022
    “…The suggested algorithm outperforms the competition in terms of improving path cost, smoothness, and search time. …”
    Get full text
    Thesis
  3. 3

    Animal voice recognition for identification (ID) detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2011
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Dog voice identification (ID) for detection system by Yeo, Che Yong, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ng, Chee Kyun

    Published 2012
    “…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Improved power output forecastingtechnique for effective battery management in photovoltaic system / Utpal Kumar Das by Utpal, Kumar Das

    Published 2019
    “…A PSO-based algorithm is adopted for the appropriate selection of dominated parameters of SVR-based model to achieve better performance. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Garbage truck staff duty roster using genetic algorithm / Nadea Suneeza Zulkifli by Zulkifli, Nadea Suneeza

    Published 2017
    “…The constraint is defined as the minimum number of each staff being assigned in the work shift in the same day and time. Experimental result shows that my three-dimensional array staffscheduling implementation based on the best problem solution of the minimum violated working time of each staff works for 28 days equally to avoid overpay.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Fuzzy logic-based algorithm resource scheduling for improving the reliability of cloud computing by Zavvar, Mohammad, Rezaei, Meysam, Garavand, Shole, Ramezani, Farhad

    Published 2016
    “…In the proposed method, the waiting time is equal to 26.99 and the turnaround time is equal to 82.99. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Microcrack Detection And Noise Reduction In Integrated Circuit Packages by Koh, Ye Sheng

    Published 2018
    “…Three algorithms are tested and evaluated in terms of microcrack detection and noise reduction which are probability based thresholding, histogram equalization, and modified Perona-Malik’s anisotropic diffusion methods. …”
    Get full text
    Get full text
    Monograph
  10. 10

    Cellular Automata-based Algorithm for Liquid Diffusion Phenomenon Modeling using imaging technique by Al-Ghaili, Abbas Mohammed Ali

    Published 2013
    “…The diffusion time has been equal to 32 seconds with 15 fps comprising 480 images per each experiment. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Segmentation of MRI brain images using statistical approaches by Balafar, Mohammad Ali

    Published 2011
    “…The non-Local means (NL-means) algorithm is a state-of-the art neighbourhood-based noisereduction method which is time-consuming and its accuracy can be improved. …”
    Get full text
    Get full text
    Thesis
  12. 12

    New global maximum power point tracking and modular voltage equalizer topology for partially shaded photovoltaic system / Immad Shams by Immad , Shams

    Published 2022
    “…In terms of controller-based, in this work, a new global maximum power point tracking (GMPPT) algorithm based on a modified butterfly optimization algorithm (MBOA) has been proposed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Reduced-rank technique for joint channel estimation in TD-SCDMA systems. by Ismail, Alyani, Sali, Aduwati, Mohd Ali, Borhanuddin, Khatun, Sabira

    Published 2013
    “…The adopted reduced rank technique is based on singular value decomposition algorithm. …”
    Get full text
    Get full text
    Article
  14. 14

    A variant fisher and Jaikuamr algorithm to solve capacitated vehicle routing problem by Sultana, Tanzima, Akhand, Md Aminul Haque, Rahman, M.M. Hafizur

    Published 2017
    “…Fisher and Jaikumar algorithm is a well-known cluster based method which creates clusters with a geometric method partitioning the customer plane into equal angular cones where the total cones are equal to the number of vehicles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    IMPLEMENTATION OF GRAPH BASED PATH PLANNING ALGORITHMS FOR INDOOR NAVIGATION by SYED KHAIZURA, SYED HUSEIN KAMIL

    Published 2018
    “…Based on the results of MATLAB simulation, the A* algorithm is the best algorithm in finding the shortest path with the least time taken. …”
    Get full text
    Get full text
    Final Year Project
  16. 16
  17. 17
  18. 18

    A comparison of watermarking image quality based on dual intermediate significant bit with genetic algorithm by Yasin, Azman, M. Zeki, Akram, Mohammed, Ghassan N.

    Published 2013
    “…In this case, when the two hidden bits are equal to the original bits, there will be no change to the other remaining bits.However, if the original value is not equal to the embedded one, the nearest pixel to the original one will be chosen as the watermarked image.The second method, GA method is used to embed two bits of watermarking data within every pixel of the original image and to find the optimal value based on the existing DISB.On the other hand, if the two embedded bits are equal to the original bits then this means the watermarked image is still the same as the original one without any changes, while in the other case GA is used in determining the minimum fitness value in which the fittest is the absolute value between the pixel and chromosome and the value of chromosome between 0-255.The results indicate that the two methods produce a high quality watermarked image, but there is a big difference in the processing time, so the DISB method is faster than the GA method.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Exp-bet packet scheduling algorithm for multiple traffic services in long term evolution (LTE) system / Ku Siti Syahidah Ku Mohd Noh by Ku Mohd Noh, Ku Siti Syahidah

    Published 2016
    “…However, both real-time and non-real-time services have equal demand which means that the urgency for such services to be scheduled cannot be neglected. …”
    Get full text
    Get full text
    Thesis
  20. 20