Search Results - (( using function using algorithm ) OR ( using virtualization technique algorithm ))
Search alternatives:
- virtualization technique »
- using virtualization »
- using algorithm »
- using function »
-
1
A new image scrambling technique using block rotation algorithm based on Rubik’s cube
Published 2013“…Objectives: the objective of this paper is to develop a new efficient image scrambling algorithm by using the Rotation technique in order to break the relationship among image elements (pixels). …”
Get full text
Get full text
Get full text
Article -
2
Virtual force field algorithm for a behaviour-based autonomous robot in unknown environments
Published 2011“…The FL algorithm is used for velocity control based on sonar readings. …”
Get full text
Get full text
Get full text
Article -
3
HSO: A hybrid swarm optimization algorithm for reducing energy consumption in the cloudlets
Published 2018“…Resource performance can be achieved through virtualization techniques which facilitates the sharing of resource providers’ information between different virtual machines. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Interpretation of machine learning model using medical record visual analytics
Published 2021“…This paper studied on the effectiveness of visual analytics techniques to identify the appropriate technique to be instantiated to the machine learning algorithm to further elaborate the results obtained by demonstrating transparency, interpreta- bility and explainability of the machine learning algorithm. …”
Get full text
Get full text
Proceeding Paper -
6
Use of level specific ce-chirp auditory brainstem response with high rates and objective algorithm in infants population
Published 2021“…The ABRs were acquired using two stimuli (LS CE-Chirp and click) at 70 and 30 dBnHL. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
-
8
Online media as a price monitor: Text analysis using text extraction technique and jaro-winkler similarity algorithm
Published 2020“…The texts analyzed were taken from three online media, namely Twitter, Liputan6.com, and Detik.com. It was analyzed using text extraction techniques and the application of the Jaro-Winkler algorithm to find commodity prices in the text collection. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
The development of spatio-temporal data model for dynamic visualization of virtual geographical information system
Published 2006“…Result shows that the proposed data model is able to perform well with a visualization algorithm using linear interpolation and an improved TIN structure. …”
Get full text
Get full text
Monograph -
10
Modeling of cupping suction system based on system identification method
Published 2022“…The transfer function model also makes use of a continuous-time transfer function. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Motion modelling using concepts of fuzzy artificial potential fields
Published 2010“…In previous work, the authors described a reliable motion modelling technique using causal inference of fuzzy cognitive maps (FCM) which has been efficiently modified for the purpose of this contribution. …”
Get full text
Get full text
Get full text
Article -
12
A novel approach to motion modeling using fuzzy cognitive map and artificial potential fields
Published 2010“…A novel decision modeling technique is developed based on capabilities of the fuzzy cognitive map (FCM) and supervised learning using the genetic algorithm (GA). …”
Get full text
Get full text
Conference or Workshop Item -
13
Development of compound clustering techniques using hybrid soft-computing algorithms
Published 2006“…The neural network methods use a number of heuristics to find appropriate parametric values. …”
Get full text
Get full text
Monograph -
14
The future of money: cryptocurrency is the way to go in Malaysia / Dr. Zuraidah Mohamed Isa, Dr. Dahlia Ibrahim and Dr. Mohamad Hanif Abu Hassan
Published 2022“…Cryptocurrency is a system that uses computers to mine it, where mining requires the solution of several mathematical algorithms. …”
Get full text
Get full text
Book Section -
15
Optimal path planning algorithms in virtual environments
Published 2006“…In addition, Extended Prim algorithm was applied to shorten the travelling time and a virtual exhibition area was used as a domain to execute and analyse the algorithms performances. …”
Get full text
Get full text
Thesis -
16
Performance Evaluation of BPSO & PCA as Feature Reduction Techniques for Bearing Fault Diagnosis
Published 2022“…K-Nearest Neighbours (K-NN) was used as an intelligent method for fault diagnosis. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
-
18
-
19
Quad separation algorithm for bounding-volume hierarchies construction in virtual environment application
Published 2013“…Thus, in this paper we presented our novel algorithm for constructing Bounding-Volume Hierarchies using Quad Splitting method. …”
Get full text
Get full text
Article -
20
A Collision Detection Algorithm For Virtual Robot-Centered Flexible Manufacturing Cell
Published 2008“…This thesis presents a collision detection algorithm for accurate simulation of a virtual flexible manufacturing cell. …”
Get full text
Get full text
Thesis
