Search Results - (( _ application towards algorithm ) OR ( based application system algorithm ))

Refine Results
  1. 1
  2. 2

    Enhancing Solutions Of Capacity Vehicle Routing Problem Based On An Improvement Ant Colony System Algorithm by Mutar, Modhi Lafta, Mohd Aboobaider, Burhanuddin, Hameed, Asaad Shakir, Yusof, Norzihani

    Published 2019
    “…The paper aims to discover an optimal route for VRP by using Improvement Ant Colony System Algorithm (IACS). Optimal routes are founded based on to decrease the distance and the time for each and every one route which directs to quickest the moving of customers to their locations, also based on developing the CVRP model for optimizing the routing issues. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Compiler-based prefetching algorithm for recursive data structure by Anuar, Nurulhaini

    Published 2007
    “…Software prefetching has been shown to be effective in reducing memory stalls in array-based applications but not in pointer-based applications. This project investigates compiler-based prefetching for pointer based applications particularly those containing Recursive Data Structures (RDS) and designs the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Opposition- based simulated kalman filters and their application in system identification by Kamil Zakwan, Mohd Azmi

    Published 2017
    “…The COOBSKF also has been compared with five other optimization algorithms and outperforms them all. Besides that, this thesis also presents the application of COOBSKF in a system identification problem. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Towards Practical Face Recognition System Employing Row-Based Distance Method In 2dpca Based Algorithms by Al-Arashi, Waled Hussein Mohammed

    Published 2014
    “…As a solution to the above mentioned issues, four new distance methods have been proposed in this thesis, which are based on the rows of a feature matrix of 2DPCA-based algorithms. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Complex-valued nonlinear adaptive filters for noncircular signals by Cyprian, Amadi Chukwuemena

    Published 2017
    “…With the limitation of the CNGD algorithm toward signal generality, an improved CNGD algorithm known as the ACNGD which is derived based on the concept of augmented complex statistic which gives optimal algorithm for the generality of signals in complex domain is introduced. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10
  11. 11

    Securing password authentication using MD5 algorithm by Siti Nabilah , Mohammad Zain

    Published 2014
    “…Apart from protection, a step toward perfect security has taken by using MD5 algorithm…”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    Tree physiology optimization on SISO and MIMO PID control tuning by Halim, A.H., Ismail, I.

    Published 2018
    “…TPO is a metaheuristic algorithm inspired from a plant growth system derived based on the idea of plant architecture and Thornley model (TM). …”
    Get full text
    Get full text
    Article
  13. 13

    Tree physiology optimization on SISO and MIMO PID control tuning by Halim, A.H., Ismail, I.

    Published 2018
    “…TPO is a metaheuristic algorithm inspired from a plant growth system derived based on the idea of plant architecture and Thornley model (TM). …”
    Get full text
    Get full text
    Article
  14. 14

    Novel Adaptive Bacterial Foraging Algorithms for Global Optimisation with Application to Modelling of a TRS by Ahmad Nor Kasruddin, Nasir, Nor Maniha, Abd Ghani, Tokhi, M. O.

    Published 2015
    “…In this paper, adaptive bacterial foraging algorithms and their application to solve real world problems is presented. …”
    Get full text
    Get full text
    Article
  15. 15

    Trust-based enhanced ACO algorithm for secure routing in IoT by Sharmin, Afsah, Motakabber, S M A, Hassan Abdalla Hashim, Aisha

    Published 2024
    “…There are security issues associated with the proliferation of IoT-connected devices, allowing IoT applications to evolve. In order to provide an energy-efficient and secure routing method for sensors deployed within a dynamic IoT network, this paper presents a trust-aware enhanced ant colony optimization (ACO)-based routing algorithm, incorporating a lightweight trust evaluation model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar by Bakhtiar, Badariyah

    Published 2007
    “…The personalization is using an agent-based approach. System architecture was designed and implement in video adaptation algorithms development. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Improved elitist genetic algorithm for reactive power planning in power system / Mohamad Fadhil Mohd Kamal by Mohd Kamal, Mohamad Fadhil

    Published 2010
    “…The genetic algorithm (GA) is a search technique based on the behaviour of natural genetics. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Stray animal complaint system using geolocation technique with rule-based Algorithm / Albin Lemuel Kushan … [et al.] by Kushan, Albin Lemuel, Mahadi, Mohamad Tajuddin, Zulhemay, Mohd Nabil, Sadikan, Siti Fairuz Nurr, Mishan, Mohd Taufik

    Published 2021
    “…Subsequently, local council are also keen to veer towards this adaptation by introducing more technologically based type of services such as parking system using mobile application. …”
    Get full text
    Get full text
    Get full text
    Book Section
  20. 20

    Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms by Ridha, Hussein Mohammed

    Published 2020
    “…The standalone photovoltaic (SAPV) system is one of the most widely used applications of the PV system. …”
    Get full text
    Get full text
    Thesis