Search Results - (( intelligence system bas algorithm ) OR ( intelligence mac protocol algorithm ))

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…MAC protocols have been extensively researched from several angles. …”
    Get full text
    Get full text
    Article
  2. 2

    An Energy Efficient Mac Layer Design for Wireless Sensor Network by Ghazvini, Mohammad Hossein Fotouhi

    Published 2008
    “…The proposed MAC protocol with an extra radio management technique together with backoff management procedure can achieve 70% more energy saving than MAC IEEE 802.15.4 standard. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Tag cloud algorithm with the inclusion of personality traits by Supli, Ahmad Affandi, Shiratuddin, Norshuhada, Ab. Aziz, Azizi

    Published 2014
    “…Therefore, the main objective of this study is to make tag cloud algorithm with the inclusion of personality traits by adjusting two prominent visual features (color and shape) as an integration of layout.In addition, the utilization of RBS (rule bas e system) approach as artificial intelligent method is also taken into account to make knowledge base that stores the relationship between the proper personality elements and particular layout.This paper also discusses findings from satisfaction evaluation of prototyping, which comprises three dimensions facet: overall layout, color, and shape .The findings showed that the majority mean value for each dimension is categorized in agree scale (6-point), which indicates that respondents are satisfied with the tag cloud layout display generated by proposed algorithm.The findings suggest interface designers to be careful in selecting the appropriate tag clouds layout to be displayed for users with varying personality differences.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4