Search Results - (( developing new window algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- window algorithm »
- java implication »
- developing new »
- new window »
-
1
Parallel Optical Window Algorithm Applied to Optical Multistage Interconnection Network
Published 2008“…In this paper, a new parallel algorithm of the window method is developed called the Balanced Parallel Window Method (BPWM) algorithm. …”
Get full text
Get full text
Article -
2
Encryption Technology on Windows Workstation
Published 2004“…This paper discusses the development of a new method for encrypting text of information in Microsoft Windows environment. …”
Get full text
Get full text
Final Year Project -
3
Development of a new nonlinear filtering algorithm for impulse noise reduction
Published 2020Get full text
Get full text
Research Report -
4
Development Of Stereo-Matching Algorithm Based On Adaptive Weighted Prediction
Published 2019“…This framework experimental result was also compared with other methods which located in standard benchmarking dataset from the Middlebury. New SMA was developed in this thesis based on AWBF. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
An improved pixel-based and region-based approach for urban growth classification algorithms / Nur Laila Ab Ghani
Published 2015“…The new urban areas identified from the binary images are classified to their urban growth forms using moving window, topological relation border length and landscape expansion index algorithms. …”
Get full text
Get full text
Thesis -
6
QTCP: an optimized and improved congestion control algorithm of high-speed TCP networks
Published 2011“…TCP researchers evaluated the performance and fairness of different TCP protocols on the basis of new algorithms. The new High-Speed Transport Control Protocols (HS-TCP) were developed but there are still many problems regarding to bandwidth utilization, throughput and packet loss rate. …”
Get full text
Get full text
Conference or Workshop Item -
7
-
8
A new domain decomposition FDTD technique for simulating electromagnetic penetration into buildings
Published 2005“…We developed two techniques for solving the problem of penetration of electromagnetic waves into large buildings. …”
Get full text
Get full text
Get full text
Proceeding Paper -
9
-
10
Traffic management algorithms for LEO satellite networks
Published 2016“…The performances of the proposed algorithms are then compared with the previously developed algorithms. …”
Get full text
Get full text
Get full text
Thesis -
11
Optimised Crossover Genetic Algorithms for Combinatorial Optimisation Problems
Published 2010“…This thesis focuses on the development of a new stream of crossover within genetic algorithms, called Optimised Crossover Genetic Algorithm (OCGA) for solving combinatorial optimisation problems, which takes into account the objective function in finding the best ofspring solution among an exponentially large number of potential ofspring. …”
Get full text
Get full text
Thesis -
12
Missing tags detection algorithm for radio frequency identification (RFID) data stream
Published 2019“…This algorithm development has been guided by methodology in four stages. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…It also allow for further research and development on the same or new approach. …”
Get full text
Get full text
Thesis -
14
Elastic-TCP: flexible congestion control algorithm to adapt for high-BDP networks
Published 2019“…In order to increase TCP flexibility to adapt for high-BDP networks, we propose a new delay-based and RTT-independent congestion control algorithm (CCA), namely Elastic-TCP. …”
Get full text
Get full text
Get full text
Article -
15
Comparative Analysis Using Bayesian Approach To Neural Network Of Translational Initiation Sites In Alternative Polymorphic Contex
Published 2012“…The objectives of this paper are to develop useful algorithms and to build a new classification model for the case study.The first approach of neural network includes training on algorithms of Resilient Backpropagation,Scaled Conjugate Gradient Backpropagation and Levenberg-Marquardt.The outputs are used in comparison with Bayesian Neural Network for efficiency comparison.The results showed that Resilient Backpropagation have the consistency in all measurement but performs less in accuracy.In second approach,the Bayesian Classifier_01 outperforms the Resilient Backpropagation by successfully increasing the overall prediction accuracy by 16.0%.The Bayesian Classifier_02 is built to improve the accuracy by adding new features of chemical properties as selected by the Information Gain Ratio method,and increasing the length of the window sequence to 201.The result shows that the built model successfully increases the accuracy by 96.0%.In comparison,the Bayesian model outperforms Tikole and Sankararamakrishnan (2008) by increasing the sensitivity by 10% and specificity by 26%. …”
Get full text
Get full text
Get full text
Article -
16
A new method of correcting uneven illumination problem in fundus images
Published 2007“…The developed algorithm has been tested and the results obtained show superior performance when compared to other known techniques for uneven illumination correction.…”
Get full text
Get full text
Proceeding Paper -
17
A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate
Published 2019“…By combining the proposed scalar arithmetic and the new point arithmetic 5P, a new scalar multiplication algorithm was developed. …”
Get full text
Get full text
Thesis -
18
An efficient unknown detection approach for RFID data stream management system
Published 2025“…This research addresses the critical issue of detecting unknown tags, focusing on optimizing processing time and energy efficiency in terms of memory usage when detecting these tags. A novel algorithm called SWOR (Sliding Window XOR-based Detection) is introduced, specifically designed to identify unknown tags within RFID data streams. …”
Get full text
Get full text
Get full text
Article -
19
Type 2 Fuzzy Inference-Based Time Series Model
Published 2019“…Furthermore, the weighted subsethood-based algorithm was applied in developing fuzzy IF–THEN rules, where it was later used to perform forecasting. …”
Get full text
Get full text
Get full text
Article -
20
Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields
Published 2015“…At the scalar arithmetic level, we develop three new algorithms to accelerate the ECSM using the non adjacent form (NAF), window ω - non adjacent form (ω - NAF) and direct recoding method (DRM), by rewriting the scalar involved in ECSM. …”
Get full text
Get full text
Get full text
Thesis
