Search Results - (( _ application ((ccl algorithm) OR (based algorithm)) ) OR ( its application need algorithm ))
Search alternatives:
- application need »
- need algorithm »
- ccl algorithm »
-
1
-
2
Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm
Published 2022“…PID is considered as simple yet powerful controller for many kinds of applications. In designing PID, user needs to set appropriate controller gain to achieve a desired performance of the control system, in terms of time response and its steady state error. …”
Get full text
Get full text
Book Chapter -
3
-
4
-
5
Modifying iEclat algorithm for infrequent patterns mining
Published 2018“…This paper proposes an enhancement algorithm based on iEclat algorithms for mining infrequent pattern.…”
Get full text
Get full text
Conference or Workshop Item -
6
CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK
Published 2023“…This enables smart grid to communicate with each of its devices and applications in monitoring and controlling the components remotely. …”
text::Thesis -
7
-
8
-
9
Implementing BiSM and CCL algorithm for managing audio storage
Published 2012“…Therefore, this paper analyzed the issues and proposed a solution to manage the audio storage.The elements from biological inspired components were studied and identified to seek for the requirements of Bio-Inspired Storing Model (BiSM).Then a structural architecture of BiSM was designed in addition the Cognitive and Constructive Learning (CCL) algorithm was proposed.Finally, BiSM and CCL algorithm were evaluated with exemplar application settings and the results were presented in a case study of MP3 music collections.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…In addition, with regard to the second algorithm SNBR, the results show that SNBR overcomes the NCPR algorithm terms of normalize routing overhead by 58.80% as its due to its dropping factor. …”
Get full text
Get full text
Get full text
Thesis -
11
Fsm-Based Enhanced March C- Algorithm For Memory Built-In Self-Test
Published 2017Get full text
Get full text
Thesis -
12
A new vertical edge detection algorithm and its application
Published 2008“…We proposed a new and fast vertical edge detection algorithm (VEDA) which is based on the contrast between the gray scale values. …”
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman
Published 2017“…After that, in exploitation process, the algorithms will exploit the generated population to search for a desired home according to the preferences and its priority. …”
Get full text
Get full text
Thesis -
15
Railway shortest path planner application using ant colony optimization algorithm / Muhammad Hassan Firdaus Ruslan
Published 2017“…Project finding are based on the Railway Shortest Path Planner (RSPP) application framework that consists of input module, output module and process module. …”
Get full text
Get full text
Thesis -
16
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
17
-
18
A Chaotic Teaching Learning Based Optimization Algorithm for Optimization Emergency Flood Evacuation Routing
Published 2016Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…Hence, this study aims to improve the limitations found in the existing chaotic-based encryption algorithms for FTP by improving its encryption speed using Henon and Logistic map. …”
Get full text
Get full text
Get full text
Article -
20
