Search Results - (( developing network coding algorithm ) OR ( based application using algorithm ))
Search alternatives:
- developing network »
- based application »
- coding algorithm »
- using algorithm »
- network coding »
-
1
Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar
Published 2006“…Back propagation neural network algorithm was used to develop and produce the classifier for corner detector algorithm. …”
Get full text
Get full text
Thesis -
2
-
3
Learning Algorithm effect on Multilayer Feed Forward Artificial Neural Network performance in image coding
Published 2007“…The obtained results show that the Quasi-Newton based algorithm has better performance as compared to the other two algorithms.…”
Get full text
Get full text
Get full text
Article -
4
Artificial immune network model based controller for vibration suppression of flexible structures
Published 2010“…The AiNet model based controller thus developed shows the capability of the approach with relatively better accuracy in comparison to using real-coded genetic algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
5
Development of a scalable video compression algorithm
Published 2012“…The result shows that the managed complexity algorithm based on Lagrangian Multiplier function outperforms the normal encoder. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
Network Traffic Classification Analysis on Differentiated Services Code Point Using Deep Learning Models for Efficient Deep Packet Inspection
Published 2024“…The Differential Services Code Point within the Differentiated Service (DiffServ) field is primarily used inside the Layer 3 encapsulated network IP packets. …”
Get full text
Get full text
Get full text
Article -
7
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
8
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Energy-driven scheduling for Digital Video Broadcasting - Satellite Second Generation (DVB-S2)
Published 2013“…Based on energy efficiency of each modulation and coding scheme (MODCOD) available in Digital Video Broadcasting - Satellite Second Generation (DVB-S2), the EEF algorithm improves a scheduling mechanism of a two-step scheduler by selecting frames to be transmitted next according to “energy efficiency” policy developed. …”
Get full text
Get full text
Conference or Workshop Item -
10
-
11
A new real coded genetic algorithm crossover: Rayleigh crossover
Published 2014Get full text
Get full text
Get full text
Article -
12
An integrated algorithm of analytical network process with case-based reasoning to support the selection of an ideal football team formation and players
Published 2021“…A new combined decision model which integrates Analytical Network Process and Case-based Reasoning was developed. …”
Get full text
Get full text
Get full text
Thesis -
13
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…Performance of the proposed algorithm was evaluated on the developed number plates’ image database captured by mobile phone’s camera, i.e. 30 images. …”
Get full text
Get full text
Get full text
Book -
14
A hybrid database encryption algorithm based on reverse string and dynamic key
Published 2016“…Personal computers has become one of the important part of human life, especially when they using the Internet or any public networks.So, the information or data may still be deliberately or inadvertently leaked out by the insiders or customers.In this paper, we proposing new algorithm to protect any type of data, depending on the substitution techniques, using dynamic key (DK) and reveres string for each character in the text (or field in the file of the database) and each string .A special equation was developed to generate the DK, it’s depend on the length of string, order the character in the string,ASCII code of the character, and string sequence.The proposed algorithm using the reverse string before encryption, also, there are two actions after that, for the purpose of increasing the complexity of the algorithm.The results showed that The developed algorithm was successes to remove any duplicate encryption, for each character and each record even when the text duplicated.…”
Get full text
Get full text
Conference or Workshop Item -
15
Neural network-based codebook search for image compression
Published 2000“…This paper presents an efficient and fast encoding of still images using feedforward neural network technique for codebook search. The image to be coded is first clustered into a small subset of neighboring images and then the neural network-based encoder is used to find the best matching code sequences in the codebook. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm
Published 2014“…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
Get full text
Get full text
Get full text
Proceeding Paper -
17
Development of new code for optical code division multiple access systems
Published 2011“…Splitting algorithm is proposed to construct the new code families namely RD code. …”
Get full text
Thesis -
18
An Adaptive Error Correction Scheme For Synchronous Digital Hierarchy-Based Wavelength Division Multiplexed Optical Network
Published 2007“…These errors become essential and more intense in the high-capacity and long-haul wavelength-division multiplexing (WDM) systems. Therefore, the development of a forward error correction (FEC) technique to mitigate errors in WDM optical networks is very relevant and important. …”
Get full text
Get full text
Thesis -
19
AUTOMATED GUIDED ROBOT (AGR)
Published 2007“…The paper describes the network algorithms developed and used in the design process of the AGR including simulations and circuit designs done for the prototype. …”
Get full text
Get full text
Final Year Project -
20
Deep learning convolutional neural network algorithms for the early detection and diagnosis of dental caries on periapical radiographs: a systematic review
Published 2021“…Deep learning algorithms have broader and more profound layers and are continually being developed, remarkably enhancing their precision in detecting and segmenting objects. …”
Get full text
Get full text
Get full text
Get full text
Article
