Search Results - (( using reading using algorithm ) OR ( evolution optimization bat algorithm ))

Refine Results
  1. 1

    Multi-Swarm bat algorithm by Taha A.M., Chen S.-D., Mustapha A.

    Published 2023
    “…In this study a new Bat Algorithm (BA) based on multi-swarm technique called the Multi-Swarm Bat Algorithm (MSBA) is proposed to address the problem of premature convergence phenomenon. …”
    Article
  2. 2

    Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff by Mohd Yusoff, Nurulanis

    Published 2017
    “…Basically, the QEEA is based on the Time Domain (TD) and Frequency Domain (FD) scheduling where it is dependent on the QoS requirements to allocate resources. The proposed algorithm is compared against other scheduling algorithms, namely, the Channel and QoS Aware (CQA), Priority Set Scheduler (PSS), Proportional Fair (PF), Maximum Throughput (MT) and Blind Average Throughput (BAT). …”
    Get full text
    Get full text
    Thesis
  3. 3

    Missing tags detection algorithm for radio frequency identification (RFID) data stream by Zainudin, Nur 'Aifaa

    Published 2019
    “…Thus in this research, an AC complement algorithm with hashing algorithm and Detect False Negative Read algorithm (DFR) is used to developed the Missing Tags Detection Algorithm (MTDA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Analysis on reading image through camera image by Amir Hamzah Ani

    Published 2024
    text::Final Year Project
  5. 5

    Fault detection with optimum March test algorithm by Zakaria, Nor Azura, Wan Hassan, Wan Zuha, Abdul Halin, Izhal, Mohd Sidek, Roslina, Xiao, Qing Wen

    Published 2013
    “…The main focus of this research is to improve fault coverage on Single Cell Faults as well as Static Double Cell Faults detection, using specified test algorithm. Transition Coupling Faults (CFtrs), Write Destructive Coupling Faults (CFwds) and Deceptive Read Destructive Faults (CFdrds) are types of faults mainly used in this research. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail by Ismail, Shafinaz

    Published 2014
    “…In RFID system, the greatest challenge faced is the tag could not be read due to collisions. To avoid these collisions, there are several anti-collision algorithms used in the RFID system. …”
    Get full text
    Get full text
    Article
  7. 7

    Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail by Ismail, Shafinaz

    Published 2014
    “…In RFID system, the greatest challenge faced is the tag could not be read due to collisions. To avoid these collisions, there are several anti-collision algorithms used in the RFID system. …”
    Get full text
    Get full text
    Thesis
  8. 8

    The data and read/write controller for March-based SRAM diagnostic algorithm MBIST by Mat Isa, Masnita, Wan Hasan, Wan Zuha, Mohd Sidek, Roslina, Abdul Halin, Izhal

    Published 2009
    “…This paper presents the implementation of March-based algorithm as proposed in into an Memory Built-in Self-Test (MBIST) data and read/write controller. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Segmentation of Malay syllables in connected digit speech using statistical approach by Salam, M.S., Mohamad, Dzulkifli, Saleh, S.H.

    Published 2008
    “…Segmentation was done in time domain signal using statistical approaches namely the Brandt’s Generalized Likelihood Ratio (GLR) algorithm and Divergence algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Context-aware diabetic patient remote monitoring using wearable and mobile App / Mohd Izzat Ismail Hashim by Ismail Hashim, Mohd Izzat

    Published 2019
    “…By applying this algorithm, LoveHealth is able to detect critical glucose reading, which are inputted by the patients manually, or heartrate readings captured from the patients' smartwatch, and notifies their respective caregivers, informing them that they require medical attention. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…Advanced Encryption Standard algorithm is being used to encrypt the text messaging. …”
    Get full text
    Get full text
    Student Project
  12. 12

    Iot health monitoring system for self quarantined covid-19 patients by Vikneswaran, Balakrishnan

    Published 2022
    “…Then to get the temperature reading we use some algorithm to calculate the temperature reading from sensor. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Fault detection with optimum March Test Algorithm by Zakaria, Nor Azura, Wan Hasan, Wan Zuha, Abdul Halin, Izhal, Mohd Sidek, Roslina, Wen, Xiaoqing

    Published 2012
    “…However after solving the undetected fault, the outcome in term of its detection result of Static Double Cell Faults using the specified test algorithm especially Transition Coupling Faults (CFtrs), Write Destructive Coupling Faults (CFwds), Read Destructive Coupling Faults (CFrds) and Deceptive Read Destructive Faults (CFdrds) are observed.…”
    Get full text
    Conference or Workshop Item
  14. 14

    Evaluation of automated phonetic labeling and segmentation for dyslexic children’s speech by Husni, Husniza, Yusof, Yuhanis, Kamaruddin, Siti Sakira

    Published 2013
    “…This is due to the highly phonetically similar reading errors produced when they read that have affected automatic speech recognition (ASR).In this work, experiments were performed using a specifically designed ASR to force-align the read speech and produce the labels and segmentations automatically.The CSLU toolkit’s force alignment algorithm has been employed to measure their performances.Selected speech data of dyslexic children’s reading in Malay were fed to the algorithm as input and the evaluation resulted in 95% agreement on phonetic labeling and only 65% on segmentation with respect to the manual ones.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    A Faster External Sorting Algorithm Using No Additional Disk Space by Islam, Md. Rafiqul, Md. Sap, Mohd. Noor, Sarker, Md. Sumon, Islam, Sk. Razibul

    Published 2006
    “…The proposed algorithm uses special in-place merging technique, which creates no extra backup file for manipulating huge records. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    RFID data reliability optimiser based on two dimensions bloom filter by Yaacob, Siti Salwani, Mahdin, Hairulnizam, Kasim, Shahreen

    Published 2017
    “…The noise and duplicate data filtering algorithm was constructed based on bloom filter. There are two bloom filters in one algorithm where each filter holds function either to remove noise data and to recognize data as correct reading from duplicate data reading. …”
    Get full text
    Get full text
    Article
  18. 18

    Multiple and solid data background scheme for testing static single cell faults on SRAM memories by Zakaria, Nor Azura

    Published 2013
    “…Therefore, the purpose of this thesis is to introduce a Data Background (DB) scheme to generate an optimal March Test Algorithm (MTA) for detecting faults of memory that are undetectable using existing algorithms. …”
    Get full text
    Get full text
    Thesis
  19. 19

    March-based diagnosis algorithm for static random-access memory stuck-at faults and transition faults by Mat Isa, Masnita

    Published 2012
    “…The fault syndrome based on read operations of the proposed algorithm is generated to determine its diagnostic capability. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Genetic algorithm optimized receiver-oriented packet clustering in multi-buffer network card by Nurika, O., Hassan, M.F., Zakaria, N., Jung, L.T.

    Published 2016
    “…In a network card, there is a packet clustering mechanism that if optimized, will increase the speed of packet reading/access at the application layer. This packet clustering optimization is an expansion of our previous base network card optimization in cloud network environment, using genetic algorithm. …”
    Get full text
    Get full text
    Article