Search Results - (( _ application designing algorithm ) OR ( some applications during algorithm ))
Search alternatives:
- application designing »
- designing algorithm »
- applications during »
- some applications »
- during algorithm »
-
1
Fast handover algorithm for hierarchical mobile IPv6 macro-mobility management
Published 2003Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
An Efficient Computational Algorithm for Solving Arbitrary Sylvester Matrix Equations in Fuzzy Control Theory (S/O 14179)
Published 2021“…With that, the constructed algorithm is considered as a new contribution to the application of control system theory…”
Get full text
Get full text
Monograph -
3
E-Grocery application with Geolocation and YOLO Algorithm / Ikhwan Nurhakim Zuzalli and Raihana Md Saidi
Published 2021“…The objective of this project is to develop an E-Grocery application using geolocation and YOLO algorithm. The users can store their groceries’ stock in the system using the YOLO algorithm. …”
Get full text
Get full text
Get full text
Book Section -
4
University class timetable tool
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
RISC-V instruction set extension on blockchain application
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Model Predictive Control Design for f Nonlinear Four-Tank System
Published 2008“…Regarding to investigate the performance of this algorithm and due to application of “nonlinear Four-Tank system” in control theory and industry, this system is considered as a plant to be examined under this method. …”
Get full text
Get full text
Thesis -
7
An enhanced color image encryption algorithm using LT-PRNG
Published 2018“…Thus, the scheme is robust and performed efficiently, and may be used in real-time applications. For future studies, the proposed encryption algorithm can be enhanced by combined compression encryption techniques, which would increase the encryption efficiency. …”
Get full text
Get full text
Thesis -
8
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Article -
9
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
An enhanced mobile internet protocol version 6 (IPv6) with multicast function and hierarchical design.
Published 2006“…Mobile IPv6 mechanism requires some handover algorithm when it changes its point of attachment in the Internet.An enhanced micro mobility handover algorithm is developed on top of mobile IPv6. …”
Get full text
Patent -
11
Denoising of digital images using second generation wavelet transforms-hidden markov model
Published 2016“…Due to the lack of translation invariance in the wavelet basis function, some artifacts may appear after applying the denoising algorithm. …”
Get full text
Get full text
Thesis -
12
Genetic algorithm based optimization of overcurrent relay coordination for improved protection of DFIG operated wind farms
Published 2018Get full text
Get full text
Conference or Workshop Item -
13
-
14
-
15
Traffic management algorithms for LEO satellite networks
Published 2016“…Overall, from all the three experiments that have been conducted, the proposed routing algorithms which have been developed to manage the network traffic have proved better than the previously developed algorithms in several perspectives especially for the implementation of real-time applications in LEO satellite networks.…”
Get full text
Get full text
Get full text
Thesis -
16
Multi agent quality of service routing based on scheme ant colony optimization algorithm
Published 2014“…It can also improve the throughput in link failure state by about 25% and decrease the packet loss rate by 27% and 39% before and during link failure respectively. Moreover, the proposed approach outperforms the WSP and SWP algorithms, where network efficiency in saturated load gains an 8.39% improvement while the satisfaction of delay and jitter constraints for time critical applications are also achieved. …”
Get full text
Get full text
Thesis -
17
-
18
Optimum Power Production of Small Hydropower Plant (SHP) Using Firefly Algorithm (FA) in Himreen Lake Dam (HLD), Eastern Iraq
Published 2017“…Thus, the addition of Kaplan turbine into Small Hydropower Plant (SHP) is verified to explore its applicability. This study focuses on the improvement of optimization model by applying particle swarm optimization and firefly algorithm methods in order to get a stable power production utility at its maximum level. …”
Get full text
Get full text
Get full text
Article -
19
New synchronization protocol for distributed system with TCP extension
Published 2013“…In the worst condition, it optimized 3.99% higher than the most fault-tolerant previous works. The resulting algorithm does not involve variability in the hardware type nor is it based on specific distributed application software or databases. …”
Get full text
Get full text
Thesis -
20
Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation
Published 2000“…The proposed new algorithm was evaluated and the results indicate that it was practical in low bit rate environments targeted by H.263 as no negative speed gain was observed for the full range of step size during the evaluation. …”
Get full text
Get full text
Thesis
