Search Results - between divide algorithm
Search alternatives:
- divide algorithm »
- between divide »
-
1
-
2
Handover procedure between macrocell and femtocell in Long Term Evolution (LTE) network: article / Nurul Afzan Zakaria
Published 2013“…The proposed handover algorithm divide into two parts which is handover from macrocell to femtocell (hand-in) handover from femtocell to macrocell (hand-out). …”
Get full text
Get full text
Article -
3
Handover procedure between macrocell and femtocell in long term evolution (LTE) network / Nurul Afzan Zakaria
Published 2013“…The proposed handover algorithm divide into two parts which is handover from macrocell to femtocell (hand-in) and handover from femtocell to macrocell (hand-out). …”
Get full text
Get full text
Thesis -
4
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Thesis -
5
Ensemble divide and conquer approach to solve the rating scores’ deviation in recommendation system
Published 2016“…The EDC approach is founded by the Singular Value Decomposition (SVD) algorithm which extracts the relationship between the latent feedback of users and the latent feedback of the items. …”
Get full text
Get full text
Get full text
Article -
6
Pengoptimuman algoritma pengesanan batu loncatan dalam sistem pengesanan pencerobohan
Published 2005“…In this research, special Top-Down methodology has been used to optimize the stepping stone algorithm. It is achieved by analyzing five stepping stone algorithms, in which each algorithm is divided into three main parts. …”
Get full text
Get full text
Thesis -
7
New approach of cryptography algorithm for e- mail applications
Published 2005“…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
Get full text
Get full text
Conference or Workshop Item -
8
Comparison of Gradient Boosting Decision Tree Algorithms for CPU Performance
Published 2021“…This paper aims to compare the performance of CPU implementation of the top three gradient boosting algorithms. We start by explaining how the three algorithms work and the hyperparameters similarities between them. …”
Get full text
Get full text
Get full text
Article -
9
Image Encrytion Using Block Based Transformation Algorithm
Published 2008“…The original image was divided into blocks, which were rearranged into a transformed image using a transformation algorithm presented here, and then the transformed image was encrypted using the Blowfish algorithm. …”
Get full text
Get full text
Get full text
Article -
10
Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks
Published 2009“…Lastly, a comparison is made through simulation between all algorithms developed in this research with previous Zero-based algorithms as well as traditional Heuristic algorithms since equal routing results can be obtained between all algorithms. …”
Get full text
Get full text
Thesis -
11
The performance of block codes in digital communication system: article / Nor Afzan Azmi
Published 2007“…The proposed handover algorithm divide into two parts which is handover from macrocell to femtocell (hand-in) and handover from femtocell to macrocell (hand-out). …”
Get full text
Get full text
Article -
12
An approach to modelling and simulating multithreaded schedulers for divide and conquer problems on multicore architecture / Alaa Mohammed Ali Wadi Al-Obaidi
Published 2016“…The first type is responsible for creating, dividing, and manipulating the threads of the Divide and Conquer algorithms. …”
Get full text
Get full text
Thesis -
13
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…The proposed solution consists of a simple, but strong encryption/decryption algorithm as well as an embedded method to exchange the keys between the users. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Development of classification model between clean water and polluted water based on capacitance properties using Levenberg Marquardt (LM) algorithm of artificial neural network / M...
Published 2020“…This project is about using the Levenberg Marquardt algorithm in Artificial Neural Network (ANN) to classified between clean and polluted water. …”
Get full text
Get full text
Student Project -
15
Performance enhancement of adaptive cluster formation and routing protocols in wireless networks
Published 2017“…ESRSBRP selects the highly stable route in term of energy as well as mobility of nodes for the individual data transmission between the source and destination. An enhanced algorithm which is used to improve the video quality was proposed, namely, Effective Broadcast Control Routing algorithm (EBCRA). …”
Get full text
Get full text
Get full text
Thesis -
16
Test of Self Por [decoded] trait no. 2 / Syafiq Abdul Samat
Published 2021“…Incoming real time feed (sound and light data) from the webcam will be divided into several columns and rows. For each section, the code will divide it again for several parts horizontally. …”
Get full text
Get full text
Book Section -
17
BRAIN ACTIVITIES FOR MOTOR MOVEMENT
Published 2012“…The main objectives of this project are to design a brain computer interface algorithm that takes Electroencephalography(EEG) signals as its input, translates them into commands for movement control and to test the performance of the designed algorithm on human subjects. …”
Get full text
Get full text
Final Year Project -
18
Disparity Refinement Based on Depth Image Layers Separation for Stereo Matching Algorithms
Published 2012“…This paper presents a method to improve the raw disparity maps in the disparity refinement stage for stereo matching algorithm. The proposed algorithm will use the disparity depth map from the stereo matching algorithm as initial disparity depth output with a basic similarity metric of SAD. …”
Get full text
Get full text
Get full text
Article -
19
Comparative study between ARX and ARMAX system identification
Published 2017Get full text
Get full text
Get full text
Article -
20
Metaheuristic multi-hop clustering optimization for energy-efficient wireless sensor network
Published 2020“…The cluster optimization algorithm will form a cluster network by dividing the sensor nodes into few clusters where each cluster has a cluster head (CH) for data collection. …”
Get full text
Get full text
Article
