Search Results - (( java implication _ algorithm ) OR ( basic complex ((data algorithm) OR (based algorithm)) ))
Search alternatives:
- java implication »
- data algorithm »
- basic complex »
-
1
Voting algorithms for large scale fault-tolerant systems
Published 2011“…By extracting various plots from different aspects, we demonstrated that, compared to the basic algorithm, our algorithm has higher reliability and availability as the quantity of the input data increases. …”
Get full text
Get full text
Thesis -
2
CHAOS BASED BLOCK ENCRYPTOR
Published 2008“…This project is basically a block encryption to protect block of data. …”
Get full text
Get full text
Final Year Project -
3
Recursive Subspace Identification Algorithm Using The Propagator Based Method
Published 2017“…However, because of the SVD computational complexity that involved in the algorithm, the classical SMI algorithms are not suitable for online application. …”
Get full text
Get full text
Get full text
Article -
4
An algorithm for the selection of planting lining technique towards optimizing land area: an algorithm for planting lining technique selection
Published 2012“…The algorithm is designed based on two basic works in which to calculate number of trees and divide an area into blocks. …”
Get full text
Get full text
Conference or Workshop Item -
5
A real-time vision-based touchless interaction of virtual heart using integration of motion gesture interaction methods
Published 2014“…Third, the range which is defined as left or right is used for gesture recognition. Lastly, the basic transformation such as rotation, translation and scale is executed if a data motion lies within the range. …”
Get full text
Get full text
Academic Exercise -
6
-
7
Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks
Published 2000“…The rest may be implemented with additional complexity. Secondly, the research shifts to the problems of point-to-multipoint algorithms by introducing the basic concept of multicasting ABR servIce and reviewing a group of consolidation schemes, where the compromise between low consolidation nOlse and fast transient response is the main issue. …”
Get full text
Get full text
Thesis -
8
Agent-based extraction algorithm for computational problem solving
Published 2015“…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
Get full text
Get full text
Thesis -
9
-
10
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…This automated generator will facilitate NPSF analysis as manual fault analysis is no longer practical due to increasing memory size. The algorithms used in this generator are based on March algorithm. …”
Get full text
Get full text
Thesis -
11
Projected majorized-correlation technique for noise filtering and accuracy in orthogonal frequency division multiplexing
Published 2020“…Moreover, the accuracy of the proposed projected signal (py>) is proven when the sinusoidal signal shows right angle (θ=90°) and the area of recovered projected signal (py>) is reduced by around 46.2891% in cm2 comparing with random signal (y>) in TQM algorithm. In addition to that, by proposing the projected signal (py>) in PQMCC technique, complexity of TQM algorithm is reduced from second order of big notation O(Nc2) to first order O(Nc).In summary, the outcome of PQMCC technique based on noise attenuation, accuracy, and complexity reduction has achieved and proven in this thesis.…”
Get full text
Get full text
Thesis -
12
Development an accurate and stable range-free localization scheme for anisotropic wireless sensor networks
Published 2022“…Besides, the weighted coefficient and centroid algorithm is employed to reduce cumulative error by hop count and cut down computational complexity. …”
Get full text
Get full text
Thesis -
13
Automated bilateral negotiation with incomplete information in the e-marketplace.
Published 2011“…In one-side incomplete information problem, comparison between MGT algorithm and smart random trade-offs (SRT) algorithm indicates that MGT outperforms SRT. …”
Get full text
Get full text
Thesis -
14
Fuzzy parameterized complex multi-fuzzy soft expert set theory and its application in decision-making
Published 2019“…This FP - CMFSES model allows us to validate the information provided by an expert, at a given phase of time, using the properties of complex fuzzy sets. We then construct an algorithm based on this concept by converting it from the complex state to the real state. …”
Get full text
Get full text
Get full text
Article -
15
Penggunaan penggugusan subtraktif bagi menjana peraturan kabur
Published 2005“…By using the fuzzy clustering algorithm, membership function could be counted based on two possible clustering methods. …”
Get full text
Get full text
Article -
16
-
17
Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence
Published 2011“…Basically, the proposed of FUHS16, UHDS16 and UHDS8 algorithm produces the best motion vector estimation finding based on the block-based matching criteria. …”
Get full text
Get full text
Get full text
Book Chapter -
18
UV-vis spectrophotometric and artificial neural network for estimation of ammonia in aqueous environment using cobalt(II) ions
Published 2024“…Quantitation of NH3 was based on the chemical reaction of NH3 with cobalt(II) (Co2+) ions in basic medium to form a blue hexamminecobaltate(II) ([Co(NH3)(6)](2+)) complex. …”
Article -
19
Review of deep convolution neural network in image classification
Published 2017“…With the development of large data age, Convolutional neural networks (CNNs) with more hidden layers have more complex network structure and more powerful feature learning and feature expression abilities than traditional machine learning methods. …”
Get full text
Get full text
Get full text
Article -
20
Fractal coding of bio-metric image for face authentication
Published 2021“…The thesis also compares the results of enough images of various sizes generated by the proposed algorithms with the results of other fractal coding methods to confirm the algorithms’ clarity, reliability and validity. …”
Get full text
Get full text
Thesis
