Search Results - (( based application during algorithm ) OR ( some application model algorithm ))*
Search alternatives:
- application during »
- based application »
- application model »
- during algorithm »
- some application »
- model algorithm »
-
1
Water level forecasting using feed forward neural networks optimized by African Buffalo Algorithm (ABO)
Published 2019“…This research proposed a swarm intelligence training algorithm, Improved African Buffalo Optimization algorithm (IABO) based on the Metaheuristic method called the African Buffalo Optimization algorithm (ABO). …”
Get full text
Get full text
Thesis -
2
-
3
Efficient prime-based method for interactive mining of frequent patterns.
Published 2011“…This is because the appropriate value depends on the type of application and expectation of the user. Moreover, in some real-time applications such as web mining and e-business, finding new correlations between patterns by changing the minimum support threshold is needed. …”
Get full text
Get full text
Article -
4
-
5
Optimization and discretization of dragonfly algorithm for solving continuous and discrete optimization problems
Published 2024“…Hence, optimization algorithms, consisting of exact and heuristic methods, are crucial for a myriad of real-world applications. …”
Get full text
Get full text
Thesis -
6
An enhanced color image encryption algorithm using LT-PRNG
Published 2018“…The image encryption algorithm depends on the Fridrich encryption model; thus, an enhancement of this structure is proposed. …”
Get full text
Get full text
Thesis -
7
E-Grocery application with Geolocation and YOLO Algorithm / Ikhwan Nurhakim Zuzalli and Raihana Md Saidi
Published 2021“…The objective of this project is to develop an E-Grocery application using geolocation and YOLO algorithm. The users can store their groceries’ stock in the system using the YOLO algorithm. …”
Get full text
Get full text
Get full text
Book Section -
8
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
text::Thesis -
9
Denoising of digital images using second generation wavelet transforms-hidden markov model
Published 2016“…In this issue, a newly developed algorithm based on second-generation wavelet transformation using semi-soft thresholding is introduced. …”
Get full text
Get full text
Thesis -
10
Model Predictive Control Design for f Nonlinear Four-Tank System
Published 2008“…Regarding to investigate the performance of this algorithm and due to application of “nonlinear Four-Tank system” in control theory and industry, this system is considered as a plant to be examined under this method. …”
Get full text
Get full text
Thesis -
11
Techno-economic optimization and modelling of grid-connected photovoltaic and battery energy storage system
Published 2023“…In this thesis, a Maximum Demand Reduction (MDRed) model is designed and created as an effective algorithm to size the solar PV and battery. …”
text::Thesis -
12
Multi agent quality of service routing based on scheme ant colony optimization algorithm
Published 2014“…It can also improve the throughput in link failure state by about 25% and decrease the packet loss rate by 27% and 39% before and during link failure respectively. Moreover, the proposed approach outperforms the WSP and SWP algorithms, where network efficiency in saturated load gains an 8.39% improvement while the satisfaction of delay and jitter constraints for time critical applications are also achieved. …”
Get full text
Get full text
Thesis -
13
Black hole algorithm along edge detector and circular hough transform based iris projection with biometric identification systems
Published 2024“…For all future access control applications, the segmentation-based BHA is effective at identifying the iris. …”
Get full text
Get full text
Article -
14
Vehicle routing problem: models and solutions
Published 2008Get full text
Get full text
Get full text
Article -
15
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Article -
16
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Modelling of river flow using particle swarm optimized cascade-forward neural networks: A case study of kelantan river in malaysia
Published 2023“…This paper presents river flow modelling based on meteorological and weather data in the Sungai Kelantan region using a cascade-forward neural network trained with particle swarm optimization algorithm (CFNNPSO). …”
Article -
18
New synchronization protocol for distributed system with TCP extension
Published 2013“…In the worst condition, it optimized 3.99% higher than the most fault-tolerant previous works. The resulting algorithm does not involve variability in the hardware type nor is it based on specific distributed application software or databases. …”
Get full text
Get full text
Thesis -
19
Development of an integrated scheduling model for handling equipment in automated port container terminals
Published 2014“…As the integrated scheduling of handling equipment is a “non-deterministic polynomialtime hard” (NP-hard) problem and also the computation time and ease of application are so important for real practices of the scheduling methods, So a meta-heuristic algorithm based on Genetic Algorithm is developed, in which, new operators create solutions considering the constraints of the problem and also a heuristic rule proposed which assigns the ALVs to the tasks. …”
Get full text
Get full text
Thesis -
20
