Search Results - (( based gathering process algorithm ) OR ( java implication force algorithm ))
Search alternatives:
- gathering process »
- process algorithm »
- implication force »
- java implication »
- force algorithm »
-
1
A spawn mobile agent itinerary planning approach for energy-efficient data gathering in wireless sensor networks
Published 2017“…Mobile agent (MA), a part of the mobile computing paradigm, was recently proposed for data gathering in Wireless Sensor Networks (WSNs). The MA-based approach employs two algorithms: Single-agent Itinerary Planning (SIP) and Multi-mobile agent Itinerary Planning (MIP) for energy-efficient data gathering. …”
Get full text
Get full text
Get full text
Article -
2
Sudoku Generator based on hybrid algorithm / Faridah Abdul Rahman
Published 2012“…The hybrid algorithm is applied in prototype development where in process on solving Sudoku. …”
Get full text
Get full text
Thesis -
3
Static image of hand gesture for numerical sign language recognition system using backfrofagation neural network / Erman Ibrahim
Published 2007“…Finally, the BP algorithm has been prove as a method that can be used for recognizing hand gesture for sign language and the successful task of recognition also dependent an the hnage processing. …”
Get full text
Thesis -
4
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…In this research, a vision system algorithm has been developed to identify and locate base of young corn trees based upon robot vision technology, pattern recognition techniques, and knowledge-based decision theory. …”
Get full text
Get full text
Thesis -
5
DESIGN OF SMART TRAFFIC LIGHT SYSTEM BASED ON INTERNET OF THINGS
Published 2018“…The data that have been collected will be sent to the cloud storage which is Thingspeak channel. The data that have gathered will be display in graph and table. The data is gather and send to the microcontroller which process the data and produce the output for the flow of the traffic light according density of the traffic at each lane. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
6
Breast cancer diagnosis through an optimization-driven multispectral gamma correction (ODMGC)
Published 2024“…The ODMGC involves a multi-step optimisation process that categorises grey-scale images of breast thermograms based on mean brightness. …”
Get full text
Get full text
Get full text
Article -
7
Enhancing NoC-based MPSoC performance: a predictive approach with ANN and guaranteed convergence arithmetic optimization algorithm
Published 2023“…The main idea of the proposed method is to develop a prediction model, speci‚cally an Arti‚cial Neural Network (ANN) optimized using the Guaranteed Convergence Arithmetic Optimization Algorithm (GCAOA-ANN), for predicting the utilized routing algorithm in NoC-based MPSoC platform during the DSE process. …”
Get full text
Get full text
Article -
8
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…Whereas the process of examining through the web pages, retrieving and searching the relevant data in a liTML page, and selecting the best satisfying data are based on the features and operations of the Genetic Algorithms.…”
Get full text
Get full text
Thesis -
9
FuMAM: fuzzy-based mobile agent migration approach for data gathering in wireless sensor networks
Published 2018“…Instead of transporting data from the nodes to the processing unit (e.g., sink) for data gathering, the MA visits each node, and thus, it performs data gathering locally. …”
Get full text
Get full text
Get full text
Article -
10
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…To provide online prediction efficiently, we advance an architecture for online predicting in Web Usage Mining system and propose a novel approach based on LCS algorithm for classifying user navigation patterns for predicting users' future requests. …”
Get full text
Get full text
Article -
11
Analyzing CT images for detecting lung cancer by applying the computational intelligence-based optimization techniques
Published 2022“…The gathered image noise is removed by applying the mean filter, and the affected regions are segmented with the help of the Butterfly Optimization Algorithm-based K-Means Clustering (BOAKMC)algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Comparison of anonymous tracker algorithms / Nur Shafikah Mat Daud
Published 2014“…By using the IP Address, can help easily to track location of anonymous. Then, time processing and accuracy which one is the best of algorithms will be determine. …”
Get full text
Get full text
Thesis -
13
School teacher-subject allocation management system
Published 2024“…So, requirement gathering using multiple methods like interviews and system analysis will be performed the narrow down the constraints used in the algorithm, while also lowering the complexity of the Genetic Algorithm to reduce the time complexity. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Fuzzy modeling and optimization of biochemical processes: a case study
Published 2010“…The obtained results show the accuracy and feasibility of proposed algorithm for optimization of biological processes.…”
Get full text
Get full text
Conference or Workshop Item -
15
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…Therefore, this research has designed fuzzy learning algorithm that is able to classify fruits based on their shape and size features using Harumanis dataset. …”
Get full text
Get full text
Thesis -
16
Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing
Published 2023“…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Octopus++: an enhanced mutual authentication protocol with lightweight encryption and decryption algorithm based on dna in fog computing
Published 2023“…Next, we proposed a modified security protocol based on ONDNA and hash message authentication code with secure hash algorithm 2. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
-
19
SINR improvement using Firefly Algorithm (FA) for Linear Constrained Minimum Variance (LCMV) beamforming technique
Published 2023Conference Paper -
20
High Rise Building Evacuation Route Model Using DIJKSTRA'S Algorithm
Published 2015“…The main algorithms involve is Dijkstra’s algorithm and then an Ant Colony Optimization algorithm is used as hybrid versions of Dijkstra’s algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis
