Search Results - (( _ application towards algorithm ) OR ( some applications using algorithm ))*
Search alternatives:
- applications using »
- towards algorithm »
- some applications »
- using algorithm »
-
1
-
2
Adaptive beamforming algorithm based on Simulated Kalman Filter
Published 2017“…Some of the metaheuristic algorithms have been modified from the original algorithms to improve the algorithms performance in adaptive beamforming application. …”
Get full text
Get full text
Thesis -
3
Securing password authentication using MD5 algorithm
Published 2014“…Apart from protection, a step toward perfect security has taken by using MD5 algorithm…”
Get full text
Get full text
Undergraduates Project Papers -
4
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…It has been applied in many practical applications. For most of the cases of the shortest route finding, the Dijkstra's algorithm is known to be an optimal search algorithm. …”
Get full text
Get full text
Thesis -
5
-
6
Enhancing Solutions Of Capacity Vehicle Routing Problem Based On An Improvement Ant Colony System Algorithm
Published 2019“…Several authors over the last only some decades have recognized many types of research and used several algorithms with various methods to solve it. …”
Get full text
Get full text
Get full text
Article -
7
Marine Predator Algorithm and Related Variants: A Systematic Review
Published 2025“…It also unveiled a steady upward trend in the use of the algorithm. The research presented different improvements and variants of MPA including parameter-tuning, enhancement of the balance between exploration and exploitation, hybridization of MPA with other techniques to harness the strengths of each of the algorithms towards complementing the weaknesses of the other, and more recently proposed advances. …”
Get full text
Get full text
Article -
8
Marine Predator Algorithm and Related Variants: A Systematic Review
Published 2025“…It also unveiled a steady upward trend in the use of the algorithm. The research presented different improvements and variants of MPA including parameter-tuning, enhancement of the balance between exploration and exploitation, hybridization of MPA with other techniques to harness the strengths of each of the algorithms towards complementing thecweaknesses of the other, and more recently proposed advances. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
Comparative study of meta-heuristics optimization algorithm using benchmark function
Published 2017“…Despite of the good performance, there is limitation in some algorithms that deteriorates by certain degree of problem type. …”
Get full text
Get full text
Article -
10
RISC-V instruction set extension on blockchain application
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Feature extraction using active appearance model algorithm with Bayesian classification approach
Published 2013“…This paper addressed some of these issues to bring face recognition more closely to being useful for real-life applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
An experimental study of modified black hole algorithms
Published 2018“…The second method is the application of a local search. Finally, a gravitational interaction, which is the essence of the gravitational search algorithm, is also applied. …”
Get full text
Get full text
Get full text
Thesis -
13
-
14
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Article -
15
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
-
17
A genetic approach for gateway placement in wireless mesh networks
Published 2015“…Recently, Wireless Mesh Network (WMN) has gained important roles in current communication technologies. It has been used in several applications, which the majorities of them are critical applications such as surveillance and rescue systems. …”
Get full text
Get full text
Get full text
Article -
18
Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar
Published 2007“…Through the algorithm, rule-based technique was used. Based on the experiment results, it is proved that the video content adaptation under e-learning environment can be achieved by the algorithms effectively.…”
Get full text
Get full text
Thesis -
19
Simulated Kalman Filter with modified measurement, substitution mutation and hamming distance calculation for solving traveling salesman problem
Published 2022“…We reviewed 57 SKF papers. 16 of them on fundamental improvements, 9 on extension of the algorithm to discrete problems and 25 on their applications. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Stray animal complaint system using geolocation technique with rule-based Algorithm / Albin Lemuel Kushan … [et al.]
Published 2021“…Subsequently, local council are also keen to veer towards this adaptation by introducing more technologically based type of services such as parking system using mobile application. …”
Get full text
Get full text
Get full text
Book Section
