Search Results - (( usage integration based algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- application stemming »
- stemming algorithm »
- usage integration »
- integration based »
- java application »
-
1
-
2
Development of a Raspberry Pi Drowsiness Detection System based on Histogram of Oriented Gradient (HOG) Algorithm and Eye Aspect Ratio (EAR) Formula
Published 2020“…This is due to the systems’ high-power usage nature, usage of expensive technologies and difficulties in integrating the detection system into all vehicles’ system. …”
Get full text
Get full text
Final Year Project -
3
Relationship based replication algorithm for data grid
Published 2014“…The Relationship based Replication algorithm aims to improve the Data Grid performance by reducing the job execution time, bandwidth and storage usage.The RBR was realized using a network simulation (OptorSim) and experiment results revealed that it offers better performance than existing replication algorithms.…”
Get full text
Get full text
Monograph -
4
Dynamic characterized genetic algorithm for adaptive beam forming in WCDMA system
Published 2005“…The new DCGA is then integrated into adaptive beam forming technique to reduce the power usage of adaptive antenna at WCDMA base station (Node B) for serving instantaneous mobile needs. …”
Get full text
Get full text
Get full text
Proceeding Paper -
5
Dynamic characterized genetic algorithm for adaptive beam forming in WCDMA system
Published 2023“…The new DCGA is then integrated into adaptive beam forming technique to reduce the power usage of adaptive antenna at WCDMA base station (Node B) for serving instantaneous mobile needs. …”
Conference paper -
6
Replica Creation Algorithm for Data Grids
Published 2012“…DRCM was evaluated using network simulation (OptorSim) based on selected performance metrics (mean job execution time, efficient network usage, average storage usage, and computing element usage), scenarios, and topologies. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
WCDMA teletraffic performance improvement via power resource optimization using distributed parallel genetic algorithm
Published 2023“…The algorithm works by finding the minimum transmitter power with the help of Distributed Parallel Genetic Algorithm (DPGA) employed on an offload microcontroller system to form optimal beam coverage to reduce power usage of adaptive antenna at WCDMA base station. …”
Conference paper -
8
DC MOTOR CONTROL USING GENETIC ALGORITHM BASED PID
Published 2011“…The usage of Genetic Algorithm is briefly explained which comprises of three main phases; reproduction, crossover and mutation. …”
Get full text
Get full text
Final Year Project -
9
Image encryption algorithm based on chaotic mapping
Published 2003“…This paper discusses an alternative symmetric-key encryption algorithm for securing images, namely Secure Image Encryption (SIP) that is based on chaos. …”
Get full text
Get full text
Get full text
Article -
10
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025“…Additionally, a benchmarking tool was developed to evaluate and compare the performance of these algorithms in terms of speed, memory, CPU usage, and encryption overhead. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Cloud computing load balancing technique with virtual machine migration / Rabiatul Addawiyah Mat Razali
Published 2017“…Besides that, the performance of this technique is analyzed by using a Cloudsim simulator. Based on the analysis, positive results of the proposed algorithm are demonstrated, which shows the load balancing process is shown to have improved based on the distribution of virtual machines onto matching-type of resources, while a more efficient migration of virtual machines can be seen based on the defined CPU usage thresholds. …”
Get full text
Get full text
Thesis -
12
Intelligent web proxy cache replacement algorithm based on adaptive weight ranking policy via dynamic aging
Published 2016“…This work proposes a hybrid method that optimize cache replacement algorithm using Naïve Bayes (NB) based approach. Naïve Bayes is an intelligent method that depends on Bayes’ probability theory integrated with Adaptive Weight Ranking Policy (AWRP) via dynamic aging factor to improve the response time and network performance. …”
Get full text
Get full text
Get full text
Article -
13
E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan
Published 2020“…TF-IDF Algorithm technique is performed to develop system by calculating the most relevant pages in the textbook based on keyword that entered by user’s query. …”
Get full text
Get full text
Thesis -
14
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…Based on the results, even though the proposed solution requires double hashing process it is still acceptable to be implemented due to it only require lower processing time and power/memory usage.…”
Get full text
Get full text
Thesis -
15
An efficient real-time terrain data organization and visualization algorithm based on enhanced triangle-based level of detail technique
Published 2006“…The purpose of this research is to design, develop and implement an algorithm for enhancing the rendering efficiency of triangle-based LOD technique. …”
Get full text
Get full text
Thesis -
16
Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar
Published 2006“…This research involved three main components - corner detector, chain code, and neural network. The integration of these components produced a corner detector algorithm and this algorithm can be used in the engine of an intelligent sketch interpreter…”
Get full text
Get full text
Thesis -
17
ATM crime detection using image processing integrated video surveillance : a systematic review
Published 2019“…Furthermore, the survey evaluates the studies from the point of view of their applicability, suitability, and usage in dynamic environment such as ATM. Viewing as a whole, despite having huge potential, a full-fledged video surveillance system integrated with image processing methods has not been found in the existing literature for ATM. …”
Get full text
Get full text
Get full text
Article -
18
Ant colony algorithm for text classification in multicore-multithread environment / Ahmad Nazmi Fadzal
Published 2017“…ACO classification accuracy is compared to Genetic Algorithm classifier which also a wrapper method. On integration of the technique, ACO is proposed to work in a multicore-multithread environment to gain additional execution time advantage. …”
Get full text
Get full text
Thesis -
19
Enhanced Storage Mechanism for Secured Parallel Network File System
Published 2018“…The challenges faced translates how the new techniques, lease and delegation algorithm for file locking, snapshot enabled locks and layouts for data state, integration of highly secured Kerberos security on storage for pNFS locks and layouts, data block size algorithm enabled deduplication on file, block and object patterns and the redundant array of independent disk data protection can create impact on storage computing system. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Design And Analysis Of Li-Ion Battery Fuel Gauge Algorithm For Mobile Systems
Published 2016“…The design is based on the integration of coulomb counting and open-circuit-voltage methods. …”
Get full text
Get full text
Thesis
