Search Results - (( developing user modified algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- implication based »
- java implication »
- developing user »
- user modified »
-
1
Two-factor authentication smart entryway using modified LBPH algorithm
Published 2024“…The system employs the Local Binary Patterns Histograms for the full face recognition algorithm and modified LBPH algorithm for occluded face detection. …”
Get full text
Get full text
Get full text
Article -
2
-
3
Resource allocation technique for powerline network using a modified shuffled frog-leaping algorithm
Published 2018“…The main goal of this work is to develop a conceptual framework and mathematical model for resource allocation using Shuffled Frog-Leap Algorithm (SFLA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Simulation Of Token Bucket Algorithm For Network Traffic Performance
Published 2020“…This algorithm has successfully reduced the delay in the network traffic and improve the response time when users request several applications concurrently.…”
Get full text
Get full text
Get full text
Article -
5
Capacity enrichment OCDMA based on algorithm of novel flexible cross correlation (FCC) address code
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
6
An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf
Published 2017“…For instance, various scheduling algorithms which offer several techniques in handling resources to the users have been developed such as Modified Largest Weighted Delay First (MLWDF), Proportional Fairness (PF) and Maximum Rate. …”
Get full text
Get full text
Thesis -
7
Quality of service and scheduling performance optimization in LTE networks / Abubakar Auwal Idris
Published 2017“…The performance of the developed VRTSA is evaluated and compared with three well-known downlink scheduling algorithms in LTE such as Proportional Fair (PF), Modified Largest Weight Delay First (MLWDF), Exponential Proportional Fair (EXP/PF) as well as recent algorithm called LTTI. …”
Get full text
Get full text
Get full text
Thesis -
8
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006Get full text
Get full text
Thesis -
9
DEVELOPMENT OF DRIVER DROWSINESS DETECTION ALGORITHM
Published 2022“…To contribute to the existing works of driver drowsiness detection systems, this project aims to develop a more useful drowsiness detection algorithm with low complexity and high performance using Python 3.10.1 software. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
10
A novel scheduling algorithm based on game theory and multicriteria decision making in LTE network
Published 2015“…On the second level, TOPSIS algorithm allocates the resources among application's users based on their criteria and the application's preferences. …”
Get full text
Get full text
Get full text
Article -
11
A modification of Shamir's Three-Pass protocol by implementing one-time pad algorithm / Nur Khairunnisa' Kusman, Nurul Hanis Abd Rashid and An Nur Ameera Zamani
Published 2019“…The objectives of this study are to modified Shamir's three-pass protocol by implementing one¬ time pad protocol and to develop Graphical User Interface (GUI) by using Maple software. …”
Get full text
Get full text
Student Project -
12
-
13
Energy detection for spectrum sensing in OFDM-based cooperative and non-cooperative radio networks
Published 2018“…Next, we developed a Constant Global False Alarm Rate (CGFAR) with Constant Global Detection Rate (CGDR) algorithm to mitigate the Cooperative SS (CSS) requirements. …”
Get full text
Get full text
Thesis -
14
Statistically controlled robust trust computing mechanism for cloud computing
Published 2014“…Quality of service plays an important role in making distributed systems.Users prefer service providers who meet the commitments specified in the Service Level Agreements to these who violate them.Cloud computing has been the recent entrant to the distributed system market and has revolutionized it by transforming the way the resources are accessed and paid for.Users can access cloud services including hardware, development platform and applications and pay only for the usage similar to the other utilities. …”
Get full text
Get full text
Get full text
Article -
15
Runtime pluggable CPU scheduler for linux operating system
Published 2010“…It also provides a flexible interface for kernel developers which facilitates the evaluation and testing for their newly developed scheduling algorithms. …”
Get full text
Get full text
Thesis -
16
Early autism spectrum disorder detection using machine learning / Muhammad Shahmi Shahron Nizan
Published 2023“…The project follows a modified waterfall approach, focusing on creating a user-friendly interface and integrating the Random Forest Classification Algorithm for accurate detection. …”
Get full text
Get full text
Thesis -
17
Joint optimization of resources allocation for quality of service aware next-generation heterogeneous cellular networks / Hayder Faeq Rasool Alhashimi
Published 2025“…First, a greedy-based user association algorithm is proposed to allocate multiple users to MBS or SBSs to maximize the total sum rate. …”
Get full text
Get full text
Get full text
Thesis -
18
-
19
Satellite attitude tracking control using thrusters and momentum wheels
Published 2018“…MATLAB software package is used as a simulation environment to develop and test the performance of the proposed tracking control algorithms using a Graphical User Interface (GUI) tool that can be expanded for future development.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
20
Securing password transmission for FTMSK webmail system using cryptographic hashing / Prasanna Ramakrisnan ... [et al.]
Published 2007“…A simple prototype defence mechanism to modify the existing login page by finding the hashing procedure was developed. …”
Get full text
Get full text
Article
