Search Results - (( evolution equalization based algorithm ) OR ( java application means algorithm ))
Search alternatives:
- evolution equalization »
- application means »
- java application »
- means algorithm »
-
1
Enhanced handover decision algorithm in heterogeneous wireless network
Published 2017“…It also employs three types of vertical handover decision algorithms: equal priority, mobile priority and network priority. …”
Get full text
Get full text
Get full text
Article -
2
-
3
-
4
A web-based implementation of k-means algorithms
Published 2022“…The K-means algorithm has been around for over a century. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
An FPGA implementation of exp-bet scheduling algorithm in LTE networks / Yusmardiah Yusuf
Published 2017“…It is performed by the scheduling algorithm implemented in the Long Term Evolution (LTE) base station, Evolved Node B. …”
Get full text
Get full text
Thesis -
6
-
7
-
8
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
Get full text
Get full text
Journal -
9
Multi-Swarm bat algorithm
Published 2023“…In this study a new Bat Algorithm (BA) based on multi-swarm technique called the Multi-Swarm Bat Algorithm (MSBA) is proposed to address the problem of premature convergence phenomenon. …”
Article -
10
Enhanced image segmentation in thermal infrared image processing for faulty detection on broadcasting equipment / Mohd Rizman Sultan Mohd, Sukreen Hana Herman and Zaiton Sharif
Published 2018“…The data gathered from the system will undergo enhanced image segmentation method using k-means clustering with the implementation of histogram equalization for further image processing algorithm to detect the presence of hot spot. …”
Get full text
Get full text
Get full text
Article -
11
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
12
Shear strength test on unsaturated soil using natural microscopic surface tension force / Basharudin Abdul Hadi
Published 2017“…There were two sets of algorithms in developing the UPLRB ANN model and every algorithm set consisted of model inputs data preparation, neural network 29 30 base of the specimen until the flow ceased..…”
Get full text
Get full text
Book Section -
13
Biometrics electronic purse
Published 1999“…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
Get full text
Get full text
Get full text
Proceeding Paper -
14
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
15
-
16
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis -
17
Mining Sequential Patterns Using I-PrefixSpan
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network
Published 2019“…Second, to reduce the routing hole problem an Energy efficient Least Edge Computation (ELEC) multi-hop clustering algorithm for WSN is proposed, which achieves nearly double network lifetime by equal energy consumption in various parts of the network as compared to existing routing strategies. …”
Get full text
Get full text
Thesis -
19
Text messaging encryption system
Published 2012Get full text
Get full text
Undergraduates Project Papers -
20
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis
