Search Results - parallel information during algorithm*

  • Showing 1 - 12 results of 12
Refine Results
  1. 1
  2. 2

    A simulation software for DNA computing algorithms implementation by Muhammad, M.S., Masra, S.M.W., Kipli, K., Zamhari, N.

    Published 2010
    “…The capturing of gel electrophoresis image represents the output of a DNA computing algorithm. Before this image is being captured, DNA computing involves parallel overlap assembly (POA) and polymerase chain reaction (PCR) that is the main of this computing algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Agro-ento bioinformation: towards the edge of reality by Syed Hassan, Syed Tajuddin

    Published 2002
    “…Bioinformation, in brief, comprises biology, information algorithms, information technology, and communication protocols. …”
    Get full text
    Get full text
    Inaugural Lecture
  4. 4

    Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM) by Shuwandy, Moceheb Lazam

    Published 2012
    “…Researchers were developed this method for the protection of this algorithm. In the end of 2010 the researcher Engineer Moceheb Lazam during his studies at the Masters in the Universiti Utara Malaysia, develop this algorithm in order to keep the encryption and decoding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Fruit-Fly Based Searching Algorithm For Cooperative Swarming Robotic System by Abidin, Zulkifli Zainal

    Published 2013
    “…The fruit flies or Drosophila Melanogaster movement strategy offers some advantages such as strategic 'search-aggregation' cycle, distribution of moving patterns with Levy Random, information sharing in real-time, and reduction of controller parameters during movements. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Unified GPU Technique to Boost Confidentiality, Integrity and Trim Data Loss in Big Data Transmission by Bhattacharjee, S., Rahim, L.B.A., Watada, J., Roy, A.

    Published 2020
    “…Data integrity, confidentiality and data loss are the issues that arise during transmission because of the use of an inadequate security scheme. …”
    Get full text
    Get full text
    Article
  8. 8

    Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining. by Saeed, Walid

    Published 2005
    “…The accuracy for rules and classification resulted from the TIP method are compared with other methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) from Rough Set, Genetic Algorithm (GA), Johnson reducer, HoltelR method, Multiple Regression (MR), Neural Network (NN), Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5); all other classifiers that are mostly used in the classification tasks. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    A QoS guaranteed link adaptation packet transmission in IEEE 802.11ac WLAN / Aliya Syahira Mohd Anuar by Mohd Anuar, Aliya Syahira

    Published 2022
    “…This study, therefore, is implemented in IEEE 802.1 lac WLAN standard to be parallel with the present high through put trend as compared with the previous WLAN standards. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Investigating computational thinking among primary school students in Terengganu using visual programming by Osmanullrazi, Abdullah

    Published 2022
    “…In addition to quantitative methods, a qualitative method of semi-structured interview based on the selected project was conducted after the students completed their projects to identify the strengths and difficulties, they had faced during the project creation. This study had implemented a two-hours per week experiment for eight weeks which had been conducted through the subject of Information Technology and Communication. …”
    Get full text
    Get full text
    Thesis