Search Results - (( _ application a algorithm ) OR ( some applications a algorithm ))*
Search alternatives:
- some applications »
- applications a »
- application a »
- a algorithm »
-
1
An Efficient Computational Algorithm for Solving Arbitrary Sylvester Matrix Equations in Fuzzy Control Theory (S/O 14179)
Published 2021“…With that, the constructed algorithm is considered as a new contribution to the application of control system theory…”
Get full text
Get full text
Monograph -
2
-
3
-
4
Implementation of Cognitive Mapping Algorithm for Robot Navigation System
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
5
Cryptography: A New Approach of Classical Hill Cipher
Published 2013Get full text
Get full text
Article -
6
On density-based data streams clustering algorithms: A survey
Published 2017“…Due to data streams characteristics, the traditional density-based clustering is not applicable. Recently, a lot of density-based clustering algorithms are extended for data streams. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Three-term backpropagation algorithm for classification problem
Published 2006“…Standard Backpropagation Algorithm (BP) is a widely used algorithm in training Neural Network that is proven to be very successful in many diverse application. …”
Get full text
Get full text
Thesis -
9
Development of heuristic task scheduling algorithm in cloud computing
Published 2016“…To this direction, in this paper we make a summary of some scheduling algorithms and propose an Enhanced Greedy Heuristic Scheduling Algorithm (EGHSA) for task scheduling adapted for big data applications. …”
Get full text
Get full text
Proceeding Paper -
10
Deploying blockchains to simplify AI algorithm auditing
Published 2023“…With increasing applications of AI algorithms, the concerns regarding its outcomes have also increased due to bias. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
HISEC: a new lightweight block cipher algorithm
Published 2014“…In this paper, we propose a new lightweight block cipher algorithm called HISEC. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Adaptive beamforming algorithm based on Simulated Kalman Filter
Published 2017“…Some of the metaheuristic algorithms have been modified from the original algorithms to improve the algorithms performance in adaptive beamforming application. …”
Get full text
Get full text
Thesis -
13
-
14
VITILIGO LESION ASSESSMENT TOOL ON SMARTPHONE
Published 2013“…However, pigment distribution analysis can be done by using digital image analysis algorithm. The independent component analysis algorithm enables accurate objective measurement of repigmentation and measurements can be made in a short period of time [1]. …”
Get full text
Get full text
Final Year Project -
15
-
16
A block-based multi-scale background extraction algorithm
Published 2010“…In addition, an amended multi-scale algorithm is introduced. This algorithm is a hybrid algorithm, a combination of some nonparametric and parametric filters. …”
Get full text
Get full text
Article -
17
-
18
Max degree around (MDA) algorithm: a smart and efficient approximate algorithm for Vertex cover and independent set problems
Published 2016“…MVC and MIS are notable for its capability of modelling other combinatorial problems and real-world applications. The aim of this paper is twofold: first to investigate failures of the state-of- the-art algorithms for MVC problem on small graphs and second to propose a simple and efficient approximation algorithm for the minimum vertex cover problem. …”
Get full text
Get full text
Get full text
Article -
19
Application of the bees algorithm to the selection features for manufacturing data
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Efficient algorithms for the key representation auditing scheme.
Published 2009Get full text
Get full text
Citation Index Journal
