Search Results - between divided algorithm

Search alternatives:

Refine Results
  1. 1
  2. 2

    Handover procedure between macrocell and femtocell in Long Term Evolution (LTE) network: article / Nurul Afzan Zakaria by Zakaria, Nurul Afzan

    Published 2013
    “…The proposed handover algorithm divide into two parts which is handover from macrocell to femtocell (hand-in) handover from femtocell to macrocell (hand-out). …”
    Get full text
    Get full text
    Article
  3. 3

    Handover procedure between macrocell and femtocell in long term evolution (LTE) network / Nurul Afzan Zakaria by Zakaria, Nurul Afzan

    Published 2013
    “…The proposed handover algorithm divide into two parts which is handover from macrocell to femtocell (hand-in) and handover from femtocell to macrocell (hand-out). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Ensemble divide and conquer approach to solve the rating scores’ deviation in recommendation system by Al-Hadi, Ismail Ahmed Al-Qasem, Mohd Sharef, Nurfadhlina, Sulaiman, Md Nasir, Mustapha, Norwati

    Published 2016
    “…The EDC approach is founded by the Singular Value Decomposition (SVD) algorithm which extracts the relationship between the latent feedback of users and the latent feedback of the items. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Pengoptimuman algoritma pengesanan batu loncatan dalam sistem pengesanan pencerobohan by Omar, Mohd. Nizam

    Published 2005
    “…In this research, special Top-Down methodology has been used to optimize the stepping stone algorithm. It is achieved by analyzing five stepping stone algorithms, in which each algorithm is divided into three main parts. …”
    Get full text
    Get full text
    Thesis
  7. 7

    New approach of cryptography algorithm for e- mail applications by Khmag, Asem, Babiker, Elsadig, Ramli, Abd Rahman

    Published 2005
    “…In this study comparison between the proposed algorithm and RSA algorithm (asymmetric algorithm) was examined and successful results were obtained. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Comparison of Gradient Boosting Decision Tree Algorithms for CPU Performance by Haithm Haithm, ALSHARI, Abdulrazak Yahya, Saleh, Alper, ODABAŞ

    Published 2021
    “…This paper aims to compare the performance of CPU implementation of the top three gradient boosting algorithms. We start by explaining how the three algorithms work and the hyperparameters similarities between them. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Image Encrytion Using Block Based Transformation Algorithm by Bani Younes, Mohammad Ali, Jantan, Aman

    Published 2008
    “…The original image was divided into blocks, which were rearranged into a transformed image using a transformation algorithm presented here, and then the transformed image was encrypted using the Blowfish algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Crosstalk-Free Scheduling Algorithms for Routing in Optical Multistage Interconnection Networks by Raja Mohd Auzar, Tengku Dian Shahida

    Published 2009
    “…Lastly, a comparison is made through simulation between all algorithms developed in this research with previous Zero-based algorithms as well as traditional Heuristic algorithms since equal routing results can be obtained between all algorithms. …”
    Get full text
    Get full text
    Thesis
  11. 11

    The performance of block codes in digital communication system: article / Nor Afzan Azmi by Azmi, Nor Afzan

    Published 2007
    “…The proposed handover algorithm divide into two parts which is handover from macrocell to femtocell (hand-in) and handover from femtocell to macrocell (hand-out). …”
    Get full text
    Get full text
    Article
  12. 12

    An approach to modelling and simulating multithreaded schedulers for divide and conquer problems on multicore architecture / Alaa Mohammed Ali Wadi Al-Obaidi by Alaa Mohammed, Ali Wadi Al-Obaidi

    Published 2016
    “…The first type is responsible for creating, dividing, and manipulating the threads of the Divide and Conquer algorithms. …”
    Get full text
    Get full text
    Thesis
  13. 13

    New Cryptographic Algorithms for Enhancing Security of Voice Data by Al-Hazaimeh, Obaida Mohammad Awad

    Published 2010
    “…The proposed solution consists of a simple, but strong encryption/decryption algorithm as well as an embedded method to exchange the keys between the users. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Development of classification model between clean water and polluted water based on capacitance properties using Levenberg Marquardt (LM) algorithm of artificial neural network / M... by Mohamad Salehuddin, Mohamad Firdaus

    Published 2020
    “…This project is about using the Levenberg Marquardt algorithm in Artificial Neural Network (ANN) to classified between clean and polluted water. …”
    Get full text
    Get full text
    Student Project
  15. 15

    Performance enhancement of adaptive cluster formation and routing protocols in wireless networks by Khalaf, Osamah Ibrahem

    Published 2017
    “…ESRSBRP selects the highly stable route in term of energy as well as mobility of nodes for the individual data transmission between the source and destination. An enhanced algorithm which is used to improve the video quality was proposed, namely, Effective Broadcast Control Routing algorithm (EBCRA). …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Test of Self Por [decoded] trait no. 2 / Syafiq Abdul Samat by Abdul Samat, Syafiq

    Published 2021
    “…Incoming real time feed (sound and light data) from the webcam will be divided into several columns and rows. For each section, the code will divide it again for several parts horizontally. …”
    Get full text
    Get full text
    Book Section
  17. 17

    BRAIN ACTIVITIES FOR MOTOR MOVEMENT by ., WAFAA ELSAYED ELBASTY

    Published 2012
    “…The main objectives of this project are to design a brain computer interface algorithm that takes Electroencephalography(EEG) signals as its input, translates them into commands for movement control and to test the performance of the designed algorithm on human subjects. …”
    Get full text
    Get full text
    Final Year Project
  18. 18

    Disparity Refinement Based on Depth Image Layers Separation for Stereo Matching Algorithms by Abd Manap, Nurulfajar, Soraghan, John J.

    Published 2012
    “…This paper presents a method to improve the raw disparity maps in the disparity refinement stage for stereo matching algorithm. The proposed algorithm will use the disparity depth map from the stereo matching algorithm as initial disparity depth output with a basic similarity metric of SAD. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Metaheuristic multi-hop clustering optimization for energy-efficient wireless sensor network by Vincent Chung, Norah Tuah, Kit Guan Lim, Min Keng Tan, Ismail Saad, Kenneth Tze Kin Teo

    Published 2020
    “…The cluster optimization algorithm will form a cluster network by dividing the sensor nodes into few clusters where each cluster has a cluster head (CH) for data collection. …”
    Get full text
    Get full text
    Article