Search Results - (( using application customization algorithm ) OR ( basic evaluation using algorithm ))
Search alternatives:
- customization algorithm »
- using application »
- basic evaluation »
- evaluation using »
- using algorithm »
-
1
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The manual method often has a lack of knowledge that the menu that shows the customer does not provide any information that customers need, such as an image of the food or ingredients used in the menu. …”
Get full text
Get full text
Thesis -
2
Routing performance enhancement in hierarchical torus network by link-selection algorithm
Published 2005“…We evaluate the dynamic communication performance of an HTN using dimension-order routing and link-selection algorithms under various traffic patterns. …”
Get full text
Get full text
Get full text
Article -
3
Dynamic communication performance enhancement in hierarchical torus network by selection algorithm
Published 2012“…The dynamic communication performances of an HTN is evaluated by using dimension-order routing and proposed adaptive routing algorithms under various traffic patterns. …”
Get full text
Get full text
Get full text
Article -
4
Adaptive routing algorithms and implementation for TESH network
Published 2013“…It is found that the communication performance of a TESH network using these adaptive algorithms is better than when the dimension-order routing algorithm is used.…”
Get full text
Get full text
Get full text
Article -
5
Butterfly traffic pattern in selection algorithm on hierarchical torus network
Published 2015“…In this paper, we have evaluated the dynamic communication performances of an HTN is evaluated by using dimension-order routing and LS+CS algorithm under butterfly traffic pattern. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Analysis randomness properties of basic components of SNOW 3G cipher in mobile systems
Published 2016“…SNOW 3G is a stream cipher algorithm used as encryption algorithm in third generation mobile phone technology (3G-UMTS). …”
Get full text
Get full text
Get full text
Article -
7
Customer segmentation on clustering algorithms
Published 2023Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…Among the applications that are usually being used by almost Internet users and also are often misused by cyber criminals are email and websites. …”
Get full text
Get full text
Thesis -
9
High performance hierarchical torus network under matrix transpose traffic patterns
Published 2004“…In this paper, we present a deadlock-free routing algorithm for the HTN using virtual channels and evaluate the network’s dynamic communication performance under matrix transpose traffic, using the proposed routing algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus
Published 2003“…This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. A multilayer feed-forward artificial neural network (ANN) with evolution programming learning algorithm for calculation of voltage stability margins (VSM). …”
Get full text
Get full text
Thesis -
11
Evaluation of stereo matching algorithms and dynamic programming for 3D triangulation
Published 2015“…The stereo matching algorithms that we applied for experimental purpose are basic block matching, sub-pixel accuracy and dynamic programming. …”
Get full text
Get full text
Book Chapter -
12
Evaluation Of Stereo Matching Algorithms And Dynamic Programming For 3D Triangulation
Published 2014“…The stereo matching algorithms that we applied for experimental purpose are basic block matching, sub-pixel accuracy and dynamic programming. …”
Get full text
Get full text
Get full text
Book Chapter -
13
-
14
-
15
The non-uniform communication performance of adaptive routing for hierarchical interconnection network for 3D VLSI
Published 2015“…this paper, we have evaluated the dynamic performance of a TESH network using different non uniform traffic patterns. …”
Get full text
Get full text
Get full text
Article -
16
Using a priori algorithm for supporting e-commerce system
Published 2005Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Data depublication using : Hashing algorithm / Naimah Nayan
Published 2019“…The objective of this project is to compare MD5 & SHA-1 algorithm in data deduplication technique and to evaluate the MD5 & SHA-1 algorithm, length of message digest and speed using deduplication software. …”
Get full text
Get full text
Thesis -
18
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…Testing of the application are using 10-Fold Cross Validation technique. 90% of the data be used as a training and another 10% be used for the testing part. …”
Get full text
Get full text
Thesis -
19
High performance hierarchical torus network
Published 2012“…The static network performances are derived from the graph model and the DCP is evaluated by using dimension-order routing and newly proposed adaptive routing algorithms under various traffic patterns. …”
Get full text
Get full text
Proceeding Paper -
20
System identification using Extended Kalman Filter
Published 2017“…In order to evaluate the performance of the EKF learning algorithm, the proposed algorithm validation were analyzed using model validation methods as a checker such as One Step Ahead (OSA) and correlation coefficient (R2). …”
Get full text
Get full text
Student Project
