Search Results - (( basic communication system algorithm ) OR ( using vectorisation using algorithm ))

Refine Results
  1. 1

    3D silhouette rendering algorithms using vectorisation technique from Kedah topography map by Che Mat, Ruzinoor, Nordin, Norani

    Published 2004
    “…The vectorisation software has been used for producing these data. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    An Automated System For Classifying Conference Papers by Ngan, Seon Choon Han

    Published 2021
    “…The Knowledge Discovery in Databases (KDD) process was followed as a formal data mining methodology where 1000 AI conference papers were carefully collected, pre-processed and transformed to numerical representations through TF-IDF vectorisation. A randomised stratified 5- fold cross validation was then applied on several data mining algorithms and evaluated using the F-measure as a metric. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    Dynamic communication performance of the TESH network under nonuniform traffic patterns by Rahman, M.M. Hafizur, Inoguchi, Yasushi, Sato, Yukinori, Miura, Yasuyuki, Horiguchi, Susumu

    Published 2009
    “…In this paper, we evaluate the dynamic communication performance of the TESH network using dimension order routing algorithm under various nonuniform traffic patterns. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Noise Cancellation method in assistive listening system by Noor Aliff, Noor Affande

    Published 2020
    “…Noise cancellation system is proposed to resolve the problem. The noise cancellation system is categorized as active type of noise cancelling method as it includes adaptive filter and adaptive algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    A highly efficient algorithm for phased-array mmWave massive MIMO beamforming by Althuwayb, Ayman Abdulhadi, Hashim, Fazirulhisyam, Liew, Jiun Terng, Khan, Imran, Jeong, Woo Lee, Affum, Emmanuel Ampoma, Ouahabi, Abdeldjalil, Jacques, Sébastien

    Published 2021
    “…Importantly, it has an abundant resource spectrum, which can significantly increase the communication rate of a mobile communication system. …”
    Get full text
    Get full text
    Article
  7. 7

    Dynamic communication performance of a TESH network under the nonuniform traffic patterns by Rahman, M.M. Hafizur, Inoguchi, Yasushi, Sato, Yukinori, Miura, Yasuyuki, Horiguchi, Susumu

    Published 2008
    “…Hierarchical interconnection networks provide high performance at low cost by exploring the locality that exists in the communication patterns of massively parallel computer systems. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8
  9. 9

    Ant system with heuristics for capacitated vehicle routing problem by Tan, Wen Fang

    Published 2013
    “…The ASH algorithm is basically applied with its probabilistic decision rule and pheromone feedback to construct the sequences of customers to be visited in the CVRP solution. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    Mobile Robot with Navigation Control and Communication by Mohammad Yatim, Amirah Izzati

    Published 2016
    “…Mobile Robot with Navigation Control and Communication is basically about a mobile robot where a list of instructions is needed to control the locomotion of the robot. …”
    Get full text
    Get full text
    Final Year Project
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    A qualitative study of families of Edwards Curves and their applications in cryptography / Nurul Azwa Kamaruddin and Nurul Ain Mustakim by Kamaruddin, Nurul Azwa, Mustakim, Nurul Ain

    Published 2012
    “…Among those cryptosystems, there are three types of public key cryptographic systems that are currently considered both secure and efficient, classified according to the mathematical problems upon which they are based: the Integer Factorization Systems (of which the RSA algorithm is the most well known example), the Discrete logarithm Systems (such as the US Government’s Digital Signature Algorithm) and the Elliptic Curve Cryptosystem (ECC). …”
    Get full text
    Get full text
    Research Reports
  20. 20

    Development of land target following system of hexacopter by Zakaria, Abdul Hafiz, Mohd Mustafah, Yasir, M. Hatta, Muhd. Mudzakkir, N. Azlan, Muhd. Nadzif

    Published 2015
    “…This paper discussed the development of a land target following system for hexacopter using on-board camera. The camera will detect the specified land target during the flight of the hexacopter and communicate with the base station to produce the GPS location of the target for necessary actions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper