Search Results - (( java implication based algorithm ) OR ( software process drops algorithm ))
Search alternatives:
- implication based »
- java implication »
- software process »
- process drops »
-
1
-
2
-
3
An Efficient Energy Aware Adaptive System-On-Chip Architecture For Real-Time Video Analytics
Published 2016“…A Performance model for Zynq is developed using analytical method and used in hardware/software codesign to facilitate algorithms mapping to hardware. …”
Get full text
Get full text
Thesis -
4
A comparative study and simulation of object tracking algorithms
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Land Use Changes in Jeli, Kelantan
Published 2013“…Satellite imagery are pre-processed in geometric correction and further processed in subsetting, masking cloud and supervised classification. …”
Get full text
Undergraduate Final Project Report -
6
-
7
-
8
Epoxy-Polyamide-Methyl Ethyl Ketone Laminate Systems Simulation On The Mechanical Properties
Published 2018“…In this research, the aim of this study is to develop simulation on the properties of epoxy laminate systems by using ANSYS simulation software. Previously, the investigation of low velocity drop impact tests on epoxy laminate systems are carried out by Du Ngoc Uy Lan on a research, ‘Investigation on The Properties of Epoxy-Polyamide-Methyl Ethyl Ketone Laminate Systems’ to determine the impact response. …”
Get full text
Get full text
Monograph -
9
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
10
Machine Learning Based Two Phase Detection and Mitigation Authentication Scheme for Denial-of-Service Attacks in Software Defined Networks
Published 2024“…This scheme incorporates machine learning techniques by utilizing Support Vector Machine (SVM) and K-Nearest Neighbors (KNN) classification algorithms to accurately identify and handle malicious network traffic following the initial packet filtration process that identifies abnormal traffic. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
VANET SECURITY FRAMEWORK FOR LOW LATENCY SAFETY APPLICATIONS
Published 2012“…The outcome of both simulation scenarios is analyzed to identify the performance of the proposed methods in terms of latency (End-to-End Delay and Processing Delay). Also, the proposed V2V protocol for a framework is validated using a software in order to establish trust among vehicles.…”
Get full text
Get full text
Thesis -
12
A new superimposed topology for single phase wireless power transfer / Azman Ab Malik
Published 2018“…Wireless Power Transfer (WPT) is a process of transferring electrical energy without using any physical wire or cable. …”
Get full text
Get full text
Thesis -
13
A new superimposed topology for single phase wireless power transfer / Azman Ab Malik
Published 2018“…Wireless Power Transfer (WPT) is a process of transferring electrical energy without using any physical wire or cable. …”
Get full text
Get full text
Book Section
