Search Results - (( parameter estimation protocol algorithm ) OR ( java implementation means algorithm ))

Refine Results
  1. 1

    Performance Enhancement of Routing Protocols in Mobile Wireless Ad-Hoc Networks Using Fuzzy Reasoning Algorithm by Natsheh, Essam Fathi

    Published 2006
    “…We will present the various application of that algorithm to ad-hoc routing protocols. Then, we will focus on four major applications that are the core of any ad-hoc routing protocol. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Development Of An Automatic Calculation Method For Ct Dose Estimation Based On Individual Specific Size In Paediatric Population by Abdulkadir, Muhammad Kabir

    Published 2022
    “…Numerical data analysed were scan parameters, estimated doses (CTDIvol and SSDE), manual and automated Deff estimates of patient size. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…The K-means algorithm has been around for over a century. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
    Get full text
    Get full text
    Journal
  5. 5

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Biometrics electronic purse by Abdul Rahman, Abdul Wahab, Eng, Chong Tan, S., M. Heng

    Published 1999
    “…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  7. 7

    EZ-SEP: extended Z-SEP routing protocol with hierarchical clustering approach for wireless heterogeneous sensor network by Nurlan, Zhanserik, Zhukabayeva, Tamara, Othman, Mohamed

    Published 2021
    “…EZ-SEP was executed and compared to routing protocols such as Z-SEP, SEP, and LEACH. The proposed algorithm performed using the MATLAB R2016b simulator. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network by Jahan, Mohammad Saukat

    Published 2015
    “…In this game, each sensor node estimates the current state of the game by detecting the channel and changes its equilibrium strategy by tuning to local contention parameters for trade-off between energy efficient and collision. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Relay suitability based routing protocol for video streaming in vehicular ad-hoc network by Omar Abdulmaged, Hammood

    Published 2022
    “…This thesis proposed a solution technique referred to as an Enhanced Transmit Packet Coding (enhanced-TPC) and weighted division algorithm (WDA) in Relay suitability-based routing protocol (RESP) term as WDA-RESP. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Movie recommendation system / Najwa Syamimie Hasnu by Hasnu, Najwa Syamimie

    Published 2020
    “…PHPMyAdmin is used to store the dataset and also acts as a database for user information. The algorithm chosen was implemented using Java Programming language and was tested using Root Means Square Error (RMSE) formula.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Orthogonal Frequency Division Multiple Access resource unit allocation algorithms for IEEE 802.11AX medium access control protocol by Zazali, Azyyati Adiah

    Published 2024
    “…The simulation results demonstrated that the proposed algorithms significantly outperformed the benchmark algorithms across several metrics. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…This project proposed a two color segmentation techniques such as K-means and Fuzzy C-means clustering algorithm that are accurately segment the desired images, which have the same color as the pre-selected pixels with background subtraction. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Skype multimedia application traffic analysis on home Unifi network / Siti Fatimah Ramle by Ramle, Siti Fatimah

    Published 2017
    “…Collected data are analysed on total of bandwidth usage and type of protocol used. Comparison is being made between different protocols used in time. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A comprehensive analysis of surface electromyography for control of lower limb exoskeleton by Abdelhakim, Deboucha

    Published 2016
    “…A parametric model based on Hill Muscle Model (HMM) to estimate the knee joint moment is developed for both experiments protocols. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A generator of cauchy-distributed time series with specific Hurst index by Estrada-Vargas, Leopoldo, Toral-Cruz, Homero, Pathan, Al-Sakib Khan

    Published 2011
    “…The resulting Cauchy-distributed series has approximately the desired location and scale parameters and exactly the desired Hurst index. The performance of the proposed generator is evaluated by estimating the location, scale and Hurst parameters from artificial time series and by calculating the mean squared error (MSE) of their cumulative distribution function (CDF). …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17
  18. 18
  19. 19

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
    Get full text
    Get full text
    Thesis
  20. 20