Search Results - (( _ application among algorithm ) OR ( based application towards algorithm ))

Refine Results
  1. 1
  2. 2

    Towards Practical Face Recognition System Employing Row-Based Distance Method In 2dpca Based Algorithms by Al-Arashi, Waled Hussein Mohammed

    Published 2014
    “…Besides, the system performance in practical applications relies on the number of eigenvectors chosen. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Opposition- based simulated kalman filters and their application in system identification by Kamil Zakwan, Mohd Azmi

    Published 2017
    “…Among the various kinds of optimization algorithms, Simulated Kalman Filter (SKF) is a new population-based optimization algorithm inspired by the estimation capability of Kalman Filter. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    Last throughput and quality-of-service aware (LTQA) scheduling algorithm in long term evolution (LTE) femtocell network / Muhammad Naqiuddin Sahrani by Sahrani, Muhammad Naqiuddin

    Published 2022
    “…The simulation of the scheduling algorithm was conducted using NS-3 and the performance of these packet scheduling algorithms was evaluated based on the performance metrics of throughput, delay, PLR and fairness for the VoIP, video and FTP applications. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Towards Wind Energy-based Charging Stations: A Review of Optimization Methods by Alhasan A.M.W., Umar D.A., Alkawsi G., Alkahtani A.A., Alomari M.A., Aris H.

    Published 2024
    “…Evidently, each algorithm or software application bears distinctive merits and demerits. …”
    Article
  12. 12
  13. 13

    Optimizing tree planting areas through integer programming and improved genetic algorithm by Md Badarudin, Ismadi

    Published 2012
    “…Therefore, a hybrid algorithm through an incorporation of Integer Programming and Improved Genetic Algorithm was proposed for planting lining design. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Performance Comparison of Nature-inspired Optimization Algorithms Applied to MVDR Technique for Canceling Multiple Access Interference Signals by Suhail Najm, Shahab, Ayib Rosdi, Zainun, Nurul Hazlina, Noordin, Izzeldin, I. Mohd

    Published 2018
    “…Findings: In comparison to conventional MVDR, the proposed algorithms have indicated that MVDRGSA providesfavorable agreement of synthesizing a maximum gain toward the desired real user angle while introducing deep null-forming in the undesired user directions. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms by Ridha, Hussein Mohammed

    Published 2020
    “…Performance results show that the MADE algorithm based on lead-acid battery has a high level of LLP and minimum cost among other types of storage batteries. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Thermal-Aware NoC for AI Computing: Tools, Algorithms, and Applications by Rokhani, Fakhrul Zaman, Stan, Mircea R., Palesi, Maurizio, Chen, Kun Chih

    Published 2026
    “…This survey paper consolidates thermal-aware Network-on-Chip (NoC) design for AI computing across tools, algorithms, and applications. Concretely, we first assemble a reproducible toolchain that couples cycle-accurate NoC simulators with power/thermal solvers and machine-learning surrogates for fast temperature prediction. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20