Search Results - (( basic computing ((can algorithm) OR (new algorithm)) ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- java implication »
- basic computing »
- can algorithm »
- new algorithm »
-
1
-
2
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
3
Voting algorithms for large scale fault-tolerant systems
Published 2011“…Using a proper test-bed, after 10000 run times, we compared our newly proposed algorithm with the basic algorithm in terms of reliability and availability. …”
Get full text
Get full text
Thesis -
4
-
5
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
6
-
7
Utilizing of flower pollination algorithm for brushless DC motor speed controller
Published 2020Get full text
Get full text
Get full text
Proceeding Paper -
8
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…The objectives of this research are to propose new algorithm to detect route failure as early warning message to the protocol to take further action, and to propose new algorithm for DSR route maintenance to response the early warning message from route failure detection algorithm. …”
Get full text
Get full text
Thesis -
9
A highly efficient algorithm for phased-array mmWave massive MIMO beamforming
Published 2021“…Simulation results show that the proposed algorithm significantly improves system performance and reduces computational complexity by more than 45% compared to traditional algorithms.…”
Get full text
Get full text
Article -
10
-
11
Multi-Robot Cooperation using Immune Network with Memory
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
12
A new 128-bit block cipher
Published 2009“…This block cipher is suitable to be applied to small devices such as mobile phones and PDAs. The existence of this new 128-bit block cipher algorithm will increase the protection of the national information infrastructure and also will contribute as an alternative to other cryptographic algorithms in security in the computing industry.…”
Get full text
Get full text
Thesis -
13
A modified reweighted fast consistent and high-breakdown estimator for high-dimensional datasets
Published 2024“…Thus, the new proposed algorithm can be applied to solve the problem of regression outliers in high-dimensional data (HDD) and serve as a better alternative to the minimum regularized covariance determinant (MRCD) estimator. © 2024 The Author(s)…”
Get full text
Get full text
Get full text
Article -
14
-
15
Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad
Published 2022“…The Website Assurance Monitoring application has been developed based on MD5 hashing technique and SHA26 algorithm. By using Microsoft Visual Basic 6.0, the Graphical User Interfaces (GUIs) of the application to provide an easy or user-friendly monitoring application. …”
Get full text
Get full text
Get full text
Article -
16
Volterra algorithm for modelling sea surface current circulation from satellite altimetry data
Published 2008Get full text
Get full text
Book Section -
17
Optical tactile sensor for robotic assisted surface characterization / Amir Abd Latif
Published 2016“…A new mathematical modelling and computer algorithm is developed and calibrated which are based on image processing methods. …”
Get full text
Get full text
Thesis -
18
Unconstraint assignment problem : a molecular computing approach
Published 2006“…Since DNA computing is very suitable for combinatorial problems, in thispaper, an idea on DNA-based computing algorithm for solving unconstraint assignment problem is proposed. …”
Get full text
Get full text
Article -
19
Fingerprint reconstruction based on improved directional image
Published 2005“…By using the directional image as ridges orientations map, its original fingerprint image is filtered using the Directional Fourier filtering to produce a new fingerprint image. The reconstruction algorithm was tested with 500 fingerprint images. …”
Get full text
Get full text
Thesis -
20
