Search Results - (( process implementing connection algorithm ) OR ( java implication from algorithm ))
Search alternatives:
- implementing connection »
- process implementing »
- connection algorithm »
- java implication »
- implication from »
- from algorithm »
-
1
An Enhanced Simulated Annealing Routing Algorithm for Semi-Diagonal Torus Network
Published 2017“…This network is both symmetric and regular; thus, make it very beneficial in the implementation process. The main objective is to maximize the number of established connection between nodes in this SD-Torus network. …”
Get full text
Get full text
Get full text
Article -
2
Quantum Processing Framework And Hybrid Algorithms For Routing Problems
Published 2010“…A typical component in QPU is a quantum device that runs quantum algorithms; namely Quantum Algorithm Processing Unit (QAPU). …”
Get full text
Get full text
Thesis -
3
Contour generation algorithm for Projection Mask Stereolithography 3D printing process
Published 2018Get full text
Get full text
Conference or Workshop Item -
4
Enhancement of parallel thinning algorithm for handwritten characters using neural network
Published 2005“…Thus, this project presents a framework for the implementation of a multilayer perceptron neural network with backpropagation algorithm, in the Parker thinning algorithm in order to produce a fast fully parallel thinning algorithm. …”
Get full text
Get full text
Thesis -
5
-
6
Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System
Published 2023“…The attribute reduction technique is implemented with Matlab. The EECPD and GAEIWPSO algorithms are implemented with Python and Networkx simulators while DTOA algorithm is implemented with iFogSim to demonstrate the efficiency of the proposed scheme. …”
Get full text
Get full text
Thesis -
7
Bundle Sorting Mobile Application
Published 2020“…The project’s purpose is to enhance the tracking method of garments’ quantity by implementing image processing in the mobile application. …”
Get full text
Get full text
Final Year Project -
8
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
9
Bio-inspired network on chip having both guaranteed throughput and best effort services using fault-tolerant algorithm
Published 2018“…Cache updates is an example of BE noncritical traffic. In this paper, we implement a novel biologically inspired fault-tolerant algorithm that provides both GT and BE QoS. …”
Get full text
Get full text
Article -
10
Bio-inspired network on chip having both guaranteed throughput and best effort services using fault-tolerant algorithm
Published 2018“…Cache updates is an example of BE noncritical traffic. In this paper, we implement a novel biologically inspired fault-tolerant algorithm that provides both GT and BE QoS. …”
Get full text
Get full text
Article -
11
-
12
Development of automatic pest sampling and detection system for cash crops
Published 2019“…Connected components algorithm was implemented for insect detection and counting. …”
Get full text
Get full text
Thesis -
13
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…The development and implementation of the proposed technique was involved the process of modifying the standard GA so that it is good and specific enough to tackle this network intrusion problem effectively. …”
Get full text
Get full text
Thesis -
14
Fuzzy logic-based intelligent scheme for enhancing QoS of vertical handover decision in vehicular ad-hoc networks
Published 2017“…In the next generation network, vertical handover can be started based on the user’s convenience or choice rather than connectivity reasons. This study proposes a vertical handover decision algorithm that uses a Fuzzy Logic (FL) algorithm, to increase QoS performance in heterogeneous vehicular ad-hoc networks (VANET). …”
Get full text
Get full text
Get full text
Article -
15
-
16
Enhance efficiency of answering XML keyword query using incompact structure of MCCTree
Published 2012“…If the result cannot be used directly by the ranking method, the algorithm has an ineffective process. Moreover, if the ineffective process requires re-examining the original tree, the efficiency of the process of the algorithm will be reduced. …”
Get full text
Get full text
Thesis -
17
Modular motor driver with torque control for gripping mechanism
Published 2023“…This is possible by taking in the magnitude of the current drawn by the load as the feedback to the system and set appropriate action to protect the system from damage when a certain setpoint of current is reached. In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
Conference paper -
18
Real-time anomaly detection using clustering in big data technologies / Riyaz Ahamed Ariyaluran Habeeb
Published 2019“…However, critical reviews have identified that the existing approaches are inefficient in processing data to detect anomalies due to the amassment of massive volumes of data through the connected devices. …”
Get full text
Get full text
Get full text
Thesis -
19
Fast clock tree generation using exact zero skew clock routing algorithm
Published 2009“…A few Perl scripts and a new visual basic based routing tool have been developed to support the methodology implementation. The routing algorithm used in this tool is based on the Exact Zero Skew Routing Algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Distributed generation system using parallel inverters supplied by unstable DC source
Published 2009“…The generation of control algorithm for three-phase inverter is implemented in Digital Signal Processing (DSP) boards. …”
Get full text
Get full text
Article
