Search Results - (( java application customization algorithm ) OR ( construct virtualization technique algorithm ))
Search alternatives:
- construct virtualization »
- virtualization technique »
- customization algorithm »
- java application »
-
1
Quad separation algorithm for bounding-volume hierarchies construction in virtual environment application
Published 2013“…Thus, in this paper we presented our novel algorithm for constructing Bounding-Volume Hierarchies using Quad Splitting method. …”
Get full text
Get full text
Article -
2
Virtual Force Algorithm and Cuckoo Search algorithm for node placement technique in wireless sensor network
Published 2013“…Wireless Sensor Network (WSN) has become one of the current technologies in the world of information technology.Coverage and connectivity are the main requirement that reflects the performance and quality of services in WSN applications.In WSN applications with a large scale area, the sensor nodes are deployed randomly in a noninvasive way.The deployment process will cause some issues such as coverage hole and overlapping that reflect to the performance of coverage area and connectivity.Node placement model is constructed to find the optimal node placement.Virtual Force Algorithm (VFA) and Cuckoo Search (CS) algorithm approach for node placement technique is analyzed to find the optimal node placement in order to improve the network coverage and connectivity with a minimum coverage hole and overlapping area.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
A Distributed Energy Aware Connected Dominating Set Technique for Wireless Sensor Networks
Published 2012Get full text
Get full text
Conference or Workshop Item -
4
Virtual GIS walkthrough Innovation Center / Mohd Sufean Abu Samah
Published 1999Get full text
Get full text
Thesis -
5
Non-regularized reconstruction of magnetic moment distribution of magnetic nanoparticles using barnacles mating optimizer
Published 2023Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
-
7
Parameter Estimation of Lorenz Attractor: A Combined Deep Neural Network and K-Means Clustering Approach
Published 2022Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
9
A NOVEL CONSTRUCTION OF VECTOR COMBINATORIAL (VC) CODE FAMILIES AND DETECTION SCHEME FOR SAC OCDMA SYSTEMS
Published 2010“…Secondly, a new detection technique based on exclusive-OR (XOR) logic is developed and compared to the reported detection techniques. …”
Get full text
Get full text
Thesis -
10
Development of a phantom and metal artifact correction (MAC) algorithm for post-operative spine computed tomography (CT) imaging / Noor Diyana Osman
Published 2014“…The MAC algorithm was developed in MATLAB environment and was applied on virtual sinogram which directly computed through forward projection of CT images. …”
Get full text
Get full text
Thesis -
11
An 11-switch multilevel inverter with a modified space vector modulation
Published 2016“…To evaluate the performance of the inverter and the effectiveness of the modulation technique in real time, a hardware prototype is constructed and the algorithm is implemented on a TMS320F2812 DSP. …”
Get full text
Get full text
Get full text
Article -
12
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Energy-efficient medium access control strategy for cooperative wireless networks
Published 2016“…Cooperative communication has been introduced as an effective, energy-efficient transmission technique, in which the single antenna nodes are encouraged to share their resources and construct a virtual Multi Input Multi Output (MIMO) system, resulting in higher diversity gain and throughput. …”
Get full text
Get full text
Thesis -
14
