Search Results - (( usage integration based algorithm ) OR ( java application stemming algorithm ))

Refine Results
  1. 1
  2. 2

    Development of a Raspberry Pi Drowsiness Detection System based on Histogram of Oriented Gradient (HOG) Algorithm and Eye Aspect Ratio (EAR) Formula by Francis Xavier, Sam Daniel

    Published 2020
    “…This is due to the systems’ high-power usage nature, usage of expensive technologies and difficulties in integrating the detection system into all vehicles’ system. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Relationship based replication algorithm for data grid by Yusof, Yuhanis

    Published 2014
    “…The Relationship based Replication algorithm aims to improve the Data Grid performance by reducing the job execution time, bandwidth and storage usage.The RBR was realized using a network simulation (OptorSim) and experiment results revealed that it offers better performance than existing replication algorithms.…”
    Get full text
    Get full text
    Monograph
  4. 4

    Dynamic characterized genetic algorithm for adaptive beam forming in WCDMA system by Tiong, Sieh Keong, Ismail, Mahamod, Hassan, Azmi

    Published 2005
    “…The new DCGA is then integrated into adaptive beam forming technique to reduce the power usage of adaptive antenna at WCDMA base station (Node B) for serving instantaneous mobile needs. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Dynamic characterized genetic algorithm for adaptive beam forming in WCDMA system by Kiong T.S., Ismail M., Hassan A.

    Published 2023
    “…The new DCGA is then integrated into adaptive beam forming technique to reduce the power usage of adaptive antenna at WCDMA base station (Node B) for serving instantaneous mobile needs. …”
    Conference paper
  6. 6

    Replica Creation Algorithm for Data Grids by Madi, Mohammed Kamel

    Published 2012
    “…DRCM was evaluated using network simulation (OptorSim) based on selected performance metrics (mean job execution time, efficient network usage, average storage usage, and computing element usage), scenarios, and topologies. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    WCDMA teletraffic performance improvement via power resource optimization using distributed parallel genetic algorithm by Prajindra S.K., Tiong S.K., Johnny Koh S.P., Yap D.F.W.

    Published 2023
    “…The algorithm works by finding the minimum transmitter power with the help of Distributed Parallel Genetic Algorithm (DPGA) employed on an offload microcontroller system to form optimal beam coverage to reduce power usage of adaptive antenna at WCDMA base station. …”
    Conference paper
  8. 8

    DC MOTOR CONTROL USING GENETIC ALGORITHM BASED PID by SHAHRONI, NURUL ASHIKIN

    Published 2011
    “…The usage of Genetic Algorithm is briefly explained which comprises of three main phases; reproduction, crossover and mutation. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Image encryption algorithm based on chaotic mapping by Salleh, Mazleena, Ibrahim, Subariah, Isnin, Ismail Fauzi

    Published 2003
    “…This paper discusses an alternative symmetric-key encryption algorithm for securing images, namely Secure Image Encryption (SIP) that is based on chaos. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Secured agriculture sensor data based on end-to-end encryption using raspberry pi by Choo, Jia Huey

    Published 2025
    “…Additionally, a benchmarking tool was developed to evaluate and compare the performance of these algorithms in terms of speed, memory, CPU usage, and encryption overhead. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  11. 11

    Cloud computing load balancing technique with virtual machine migration / Rabiatul Addawiyah Mat Razali by Mat Razali, Rabiatul Addawiyah

    Published 2017
    “…Besides that, the performance of this technique is analyzed by using a Cloudsim simulator. Based on the analysis, positive results of the proposed algorithm are demonstrated, which shows the load balancing process is shown to have improved based on the distribution of virtual machines onto matching-type of resources, while a more efficient migration of virtual machines can be seen based on the defined CPU usage thresholds. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging by Olanrewaju, Rashidah Funke, Al-Qudah, Dua'a Mahmoud Mohammad, Azman, Amelia Wong, Yaacob, Mashkuri

    Published 2016
    “…This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. Naïve Bayes is an intelligent method that depends on Bayes’ probability theory integrated with Adaptive Weight Ranking Policy (AWRP) via dynamic aging factor to improve the response time and network performance. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan by Mohd Ridzuan, Nur Hafizah

    Published 2020
    “…TF-IDF Algorithm technique is performed to develop system by calculating the most relevant pages in the textbook based on keyword that entered by user’s query. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…Based on the results, even though the proposed solution requires double hashing process it is still acceptable to be implemented due to it only require lower processing time and power/memory usage.…”
    Get full text
    Get full text
    Thesis
  15. 15

    An efficient real-time terrain data organization and visualization algorithm based on enhanced triangle-based level of detail technique by Zamri, Muhamad Najib

    Published 2006
    “…The purpose of this research is to design, develop and implement an algorithm for enhancing the rendering efficiency of triangle-based LOD technique. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar by Subri, Syarul Haniz

    Published 2006
    “…This research involved three main components - corner detector, chain code, and neural network. The integration of these components produced a corner detector algorithm and this algorithm can be used in the engine of an intelligent sketch interpreter…”
    Get full text
    Get full text
    Thesis
  17. 17

    ATM crime detection using image processing integrated video surveillance : a systematic review by Sikandar, Tasriva, Kamarul Hawari, Ghazali, Rabbi, M. F.

    Published 2019
    “…Furthermore, the survey evaluates the studies from the point of view of their applicability, suitability, and usage in dynamic environment such as ATM. Viewing as a whole, despite having huge potential, a full-fledged video surveillance system integrated with image processing methods has not been found in the existing literature for ATM. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Ant colony algorithm for text classification in multicore-multithread environment / Ahmad Nazmi Fadzal by Fadzal, Ahmad Nazmi

    Published 2017
    “…ACO classification accuracy is compared to Genetic Algorithm classifier which also a wrapper method. On integration of the technique, ACO is proposed to work in a multicore-multithread environment to gain additional execution time advantage. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Enhanced Storage Mechanism for Secured Parallel Network File System by K J, Latesh Kumar

    Published 2018
    “…The challenges faced translates how the new techniques, lease and delegation algorithm for file locking, snapshot enabled locks and layouts for data state, integration of highly secured Kerberos security on storage for pNFS locks and layouts, data block size algorithm enabled deduplication on file, block and object patterns and the redundant array of independent disk data protection can create impact on storage computing system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Design And Analysis Of Li-Ion Battery Fuel Gauge Algorithm For Mobile Systems by Wong , Teck Sing

    Published 2016
    “…The design is based on the integration of coulomb counting and open-circuit-voltage methods. …”
    Get full text
    Get full text
    Thesis