Search Results - (( developing new window algorithm ) OR ( java implication based algorithm ))

Refine Results
  1. 1

    Parallel Optical Window Algorithm Applied to Optical Multistage Interconnection Network by Othman, Mohamed, Abdullah, Monir, Johari, Rozita

    Published 2008
    “…In this paper, a new parallel algorithm of the window method is developed called the Balanced Parallel Window Method (BPWM) algorithm. …”
    Get full text
    Get full text
    Article
  2. 2

    Encryption Technology on Windows Workstation by Amdan, Zulkhaimi

    Published 2004
    “…This paper discusses the development of a new method for encrypting text of information in Microsoft Windows environment. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4

    Development Of Stereo-Matching Algorithm Based On Adaptive Weighted Prediction by Abd Razak, Siti Safwana

    Published 2019
    “…This framework experimental result was also compared with other methods which located in standard benchmarking dataset from the Middlebury. New SMA was developed in this thesis based on AWBF. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    An improved pixel-based and region-based approach for urban growth classification algorithms / Nur Laila Ab Ghani by Ab Ghani, Nur Laila

    Published 2015
    “…The new urban areas identified from the binary images are classified to their urban growth forms using moving window, topological relation border length and landscape expansion index algorithms. …”
    Get full text
    Get full text
    Thesis
  6. 6

    QTCP: an optimized and improved congestion control algorithm of high-speed TCP networks by Qureshi, Barkatullah, Othman, Mohamed, K. Subramaniam, Shamala, Abdul Hamid, Nor Asilah Wati

    Published 2011
    “…TCP researchers evaluated the performance and fairness of different TCP protocols on the basis of new algorithms. The new High-Speed Transport Control Protocols (HS-TCP) were developed but there are still many problems regarding to bandwidth utilization, throughput and packet loss rate. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    A new domain decomposition FDTD technique for simulating electromagnetic penetration into buildings by Abd-EI-Raouf, Hany Ehsan

    Published 2005
    “…We developed two techniques for solving the problem of penetration of electromagnetic waves into large buildings. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9
  10. 10

    Traffic management algorithms for LEO satellite networks by Huyop @ Ayop, Fahrul Hakim

    Published 2016
    “…The performances of the proposed algorithms are then compared with the previously developed algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Optimised Crossover Genetic Algorithms for Combinatorial Optimisation Problems by Nazif, Habibeh

    Published 2010
    “…This thesis focuses on the development of a new stream of crossover within genetic algorithms, called Optimised Crossover Genetic Algorithm (OCGA) for solving combinatorial optimisation problems, which takes into account the objective function in finding the best ofspring solution among an exponentially large number of potential ofspring. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Face recognition and identification system (FaceRec) / Khew Jye Huei by Khew , Jye Huei

    Published 2004
    “…It also allow for further research and development on the same or new approach. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Elastic-TCP: flexible congestion control algorithm to adapt for high-BDP networks by Alrshah, Mohamed Alhadi Mahmoud, Al-Moqri, Mohamed A., Othman, Mohamed

    Published 2019
    “…In order to increase TCP flexibility to adapt for high-BDP networks, we propose a new delay-based and RTT-independent congestion control algorithm (CCA), namely Elastic-TCP. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Comparative Analysis Using Bayesian Approach To Neural Network Of Translational Initiation Sites In Alternative Polymorphic Contex by Herman, Nanna Suryana, Husin, Nurul Arneida, Hussin, Burairah

    Published 2012
    “…The objectives of this paper are to develop useful algorithms and to build a new classification model for the case study.The first approach of neural network includes training on algorithms of Resilient Backpropagation,Scaled Conjugate Gradient Backpropagation and Levenberg-Marquardt.The outputs are used in comparison with Bayesian Neural Network for efficiency comparison.The results showed that Resilient Backpropagation have the consistency in all measurement but performs less in accuracy.In second approach,the Bayesian Classifier_01 outperforms the Resilient Backpropagation by successfully increasing the overall prediction accuracy by 16.0%.The Bayesian Classifier_02 is built to improve the accuracy by adding new features of chemical properties as selected by the Information Gain Ratio method,and increasing the length of the window sequence to 201.The result shows that the built model successfully increases the accuracy by 96.0%.In comparison,the Bayesian model outperforms Tikole and Sankararamakrishnan (2008) by increasing the sensitivity by 10% and specificity by 26%. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A new method of correcting uneven illumination problem in fundus images by Aibinu, Abiodun Musa, Iqbal, Muhammad Imran, Nilsson, Mikael, Salami, Momoh Jimoh Emiyoka

    Published 2007
    “…The developed algorithm has been tested and the results obtained show superior performance when compared to other known techniques for uneven illumination correction.…”
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate by Abdulraheem, Waleed Khalid Amin

    Published 2019
    “…By combining the proposed scalar arithmetic and the new point arithmetic 5P, a new scalar multiplication algorithm was developed. …”
    Get full text
    Get full text
    Thesis
  18. 18

    An efficient unknown detection approach for RFID data stream management system by Siti Salwani, Yaacob, Hairulnizam, Mahdin, Wijayanto, Inung, Muhammad Aamir, -, Mohd Izham, Mohd Jaya, Nabilah Filzah, Mohd Radzuan, Al Fahim, Mubarak Ali

    Published 2025
    “…This research addresses the critical issue of detecting unknown tags, focusing on optimizing processing time and energy efficiency in terms of memory usage when detecting these tags. A novel algorithm called SWOR (Sliding Window XOR-based Detection) is introduced, specifically designed to identify unknown tags within RFID data streams. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Type 2 Fuzzy Inference-Based Time Series Model by Nur Fazliana, Rahim, Mahmod, Othman, Rajalingam, Sokkalingam, Evizal, Abdul Kadir

    Published 2019
    “…Furthermore, the weighted subsethood-based algorithm was applied in developing fuzzy IF–THEN rules, where it was later used to perform forecasting. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields by Al-Saffar, Najlae Falah Hameed

    Published 2015
    “…At the scalar arithmetic level, we develop three new algorithms to accelerate the ECSM using the non adjacent form (NAF), window ω - non adjacent form (ω - NAF) and direct recoding method (DRM), by rewriting the scalar involved in ECSM. …”
    Get full text
    Get full text
    Get full text
    Thesis