Search Results - (( _ application ((based algorithm) OR (new algorithm)) ) OR ( wave application need algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes by Reem Mustafa , Mah’d Al Debes

    Published 2025
    “…The research leverages Artificial Intelligence (AI)-based Genetic Algorithms (GA) and game theory to address critical challenges in resource allocation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A novel methodology for hydrocarbon depth prediction in seabed logging: Gaussian process-based inverse modeling of electromagnetic data by Daud, H., Mohd Aris, M.N., Mohd Noh, K.A., Dass, S.C.

    Published 2021
    “…Acquiring EM responses using mesh-based algorithms is a time-consuming task. Thus, this work compared the time taken by the CST and GP in evaluating the EM profiles. …”
    Get full text
    Get full text
    Article
  6. 6

    Random traveling wave pulse coupled oscillator (RTWPCO) algorithm of energy-efficient wireless sensor networks by Al-Mekhlafi, Zeyad Ghaleb Aqlan, Mohd Hanapi, Zurina, Othman, Mohamed, Ahmad Zukarnain, Zuriati, Shamsan Saleh, Ahmed M.

    Published 2018
    “…To avert this problem, this study proposes a new mechanism called random traveling wave pulse-coupled oscillator algorithm, which is a self-organizing technique for energy-efficient wireless sensor networks using the phase-locking traveling wave pulse-coupled oscillator and random method on anti-phase of the pulse-coupled oscillator model. …”
    Get full text
    Get full text
    Article
  7. 7

    An approximation approach for free space wave propagation by Hasan, Mohammad Khatim, Sulaiman, Jumat, Othman, Mohamed

    Published 2009
    “…In this paper, we propose a new algorithm with high order characteristic. The efficiency of the new algorithm is tested and compared with the efficiency of high order FDTD method by some numerical experiment. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9
  10. 10

    Multi-base number representation in application to scalar multiplication and pairing computation by Mohammed Ismail, Abdelwahed

    Published 2011
    “…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    RFID data reliability optimiser based on two dimensions bloom filter by Yaacob, Siti Salwani, Mahdin, Hairulnizam, Kasim, Shahreen

    Published 2017
    “…The noise and duplicate data filtering algorithm was constructed based on bloom filter. There are two bloom filters in one algorithm where each filter holds function either to remove noise data and to recognize data as correct reading from duplicate data reading. …”
    Get full text
    Get full text
    Article
  13. 13

    Adaptive beamforming algorithm based on Simulated Kalman Filter by Kelvin Lazarus, Lazarus

    Published 2017
    “…Some of the metaheuristic algorithms have been modified from the original algorithms to improve the algorithms performance in adaptive beamforming application. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A new cryptographic algorithm based on decomposition problem in elliptic curve cryptography / Hilyati Hanina Zazali by Hilyati Hanina, Zazali

    Published 2012
    “…The third algorithm describes the application of Decomposition Problem to the signing and verifying digital messages in ECC. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Propose a New Machine Learning Algorithm based on Cancer Diagnosis by Ali, Mohammed Hasan, Kohbalan, Moorthy, Anad, Mohammed Morad, Mohammed, Mohammed Abdulameer

    Published 2018
    “…In this review, we focus on the current status of machine learning applications in cancer research, also propose a new algorithm Fast Learning Network to work based on cancer research.…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20