Search Results - (( using communication styles algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- communication styles »
- using communication »
- implication based »
- styles algorithm »
- java implication »
-
1
Effectiveness of silhouette rendering algorithms in terrain visualisation
Published 2002“…Silhouette Rendering Algorithms have been successfully used in various applications such as communicating shape and cartoon rendering.This paper explores how effective silhouette rendering algorithms could be used in terrain visualisation. …”
Get full text
Get full text
Conference or Workshop Item -
2
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…E-mail is used for communication between strangers and friends. …”
Get full text
Get full text
Research Reports -
3
-
4
3D silhouette rendering algorithms using vectorisation technique from Kedah topography map
Published 2004“…This paper explores how silhouette rendering algorithms could be created using a data that have been extracted from Kedah topography map. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
An approximation approach for free space wave propagation
Published 2009“…Modern High technology live style demand an exhaustive used of electromagnetic devices, whether in civilian or military purposes. …”
Get full text
Get full text
Conference or Workshop Item -
6
Employee image in social media as a promotion tool / Harry Ray Usah
Published 2022“…The browsing algorithms are always changing in favor of personal accounts and this making the online browsing traffic to be packed and this it were necessarily to make a fee for a single post so that subscribers can view the products that they want without any disturbance such as advertisement that employee nowadays are being used as one of the communication and advertisement method in social media, by that employee are also can earn something such as pay for become the company model and in the same time they can promote themselves and can use that platform in the way to make their own business as they have been known by others while they promoting their company business activity in social media platform.…”
Get full text
Get full text
Book Section -
7
-
8
Survey of File Carving Techniques
Published 2021Get full text
Get full text
Get full text
Book Chapter -
9
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
10
CHINESE CHARACTER RECOGNITION USING SUPPORT VECTOR MACHINE
Published 2023“…Chinese characters are one of the world's most widely used writing systems. It is used by more than one-quarter of the world�s population in daily communication. …”
Article -
11
Evaluation of Instagram's neural machine translation for literary texts: an MQM-Based Analysis
Published 2024“…From 30 purposively selected Instagram captions with literary content, the study found Instagram's machine translation lacking in 90% of cases, particularly in accuracy, fluency, and style. Among these, 61 errors were identified: 26 in fluency, 25 in accuracy, and 10 in style, adversely affecting the quality and failing to convey the original message. …”
Get full text
Get full text
Get full text
Article -
12
The internal branding practice and brand citizenship behavior: the mediating effects of employee brand fit
Published 2018“…Primarily, this study explored the role of employee brand fit as a mediator on the relationship between internal branding practices namely brand leadership, brand reward, brand training and brand communication and employee BCB. Partial Least Squares Method (PLS) algorithm and bootstrap techniques were used to test the study hypotheses. …”
Get full text
Get full text
Get full text
Thesis -
13
-
14
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…This paper proposed the NAGE method as a straight forward transformation from sequential to parallel algorithm using domain decomposition and splitting strategies. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Worst-case latency analysis for AVB traffic under overlapping-based time-triggered windows in time-sensitive networks
Published 2022“…Preemption and non-preemption modes are compared under different loading conditions, resulting in lower WCDs using preemption mode than non-preemption, especially with porosity style. …”
Get full text
Get full text
Article -
16
Social Media Portfolio (ENT 530): InternetNetizen / Putera Muhammad Hakimi Zaini
Published 2021“…Social media such as Facebook, Instagram, and WhatsApp for any inquiries or transactional processes about the product also promote, communicate, and interact with the customers. After that, ‘InternetNetizen’ decided to use online social media platforms such as Facebook, Instagram, and WhatsApp. …”
Get full text
Get full text
Entrepreneurship Project -
17
-
18
Fundamentals of Entreoreneurship ENT 300 : Preloved By Qysqus / Nur Qystyna Nasharuddin
Published 2021Get full text
Get full text
Entrepreneurship Project -
19
Deep reinforcement learning based resource allocation strategy in cloud-edge computing system
Published 2024“…In this work, the research focus on the simulation testing of the MAL-DRL algorithm against classical Random Allocation (RA) and singe agent DRL methods. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Deep reinforcement learning based resource allocation strategy in cloud-edge computing system
Published 2024“…In this work, the research focus on the simulation testing of the MAL-DRL algorithm against classical Random Allocation (RA) and singe agent DRL methods. …”
Get full text
Get full text
Conference or Workshop Item
