Search Results - (( _ application tools algorithm ) OR ( based application among algorithm ))*
Search alternatives:
- application tools »
- based application »
- application among »
- tools algorithm »
- among algorithm »
-
1
-
2
An event-driven simulation for highest urgency first (HUF) : a latency and modulation aware bandwidth allocation algorithm for WiMAX base stations.
Published 2013“…To strike an ideal balance in gauging these trade-offs and to further complement the repository of simulators, this paper presents the details of a general-purpose programming language based discrete event simulation for WiMAX. This research has focused at developing a discrete-event simulator to implement bandwidth allocation algorithms for a WiMAX base station.The highest urgency first algorithm has been utilized as a benchmark deployment algorithm in order to provide: dynamic downlink/uplink adjustment and latency guarantee for real-time applications. …”
Get full text
Get full text
Article -
3
AUTOMATIC ROUTE FINDER FOR NEW VISITORS
Published 2006“…This study is based on Dijkstra's algorithm as the algorithm finds the most effective way to traverse an entire graph. …”
Get full text
Get full text
Final Year Project -
4
Thermal-Aware NoC for AI Computing: Tools, Algorithms, and Applications
Published 2026“…This survey paper consolidates thermal-aware Network-on-Chip (NoC) design for AI computing across tools, algorithms, and applications. Concretely, we first assemble a reproducible toolchain that couples cycle-accurate NoC simulators with power/thermal solvers and machine-learning surrogates for fast temperature prediction. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006Get full text
Get full text
Monograph -
7
Mobile game application development using evolutionary algorithms
Published 2014“…Evolutionary Algorithms have never been used on mobile applications, thus it gives a novel idea of utilizing Evolutionary Algorithms in developing applications typically in games for mobile platforms. …”
Get full text
Get full text
Get full text
Thesis -
8
A conceptual framework for multi-objective optimization of building performance: Integrating intelligent algorithms, simulation tools, and climate adaptation
Published 2025“…This study systematically examined recent research trends in multi-objective optimization (MOO) for building performance from 2020 to 2024 and proposed a conceptual framework integrating intelligent algorithms, simulation tools, and climate adaptation strategies. …”
Get full text
Get full text
Get full text
Article -
9
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
10
Haze removal algorithm using improved restoration model based on dark channel prior / Dai Zhen
Published 2019“…Based on the atmospheric physical model, this research proposed a haze removal algorithm using improved restoration model based on dark channel prior, which has good robustness to the bright sky regions, and also has a good effect on the edges. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
Towards Wind Energy-based Charging Stations: A Review of Optimization Methods
Published 2024“…Evidently, each algorithm or software application bears distinctive merits and demerits. …”
Article -
13
-
14
Optimisation of energy efficient Assembly Sequence Planning using Moth-Flame Optimisation alghorithm
Published 2019“…The LSD result indicated that the MFO had a significant difference in 67 % of the cases as compared to the comparison algorithms. The result from the case study confirmed that the proposed EE-ASP model and MFO algorithm were applicable for the actual assembly data. …”
Get full text
Get full text
Thesis -
15
-
16
-
17
Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms
Published 2020“…Performance results show that the MADE algorithm based on lead-acid battery has a high level of LLP and minimum cost among other types of storage batteries. …”
Get full text
Get full text
Thesis -
18
-
19
Designing and implementation of robot mapping algorithm for mobile robot
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
20
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Article
