Search Results - (( based application towards algorithm ) OR ( based applications among algorithm ))*

Refine Results
  1. 1

    Towards Practical Face Recognition System Employing Row-Based Distance Method In 2dpca Based Algorithms by Al-Arashi, Waled Hussein Mohammed

    Published 2014
    “…As a solution to the above mentioned issues, four new distance methods have been proposed in this thesis, which are based on the rows of a feature matrix of 2DPCA-based algorithms. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Opposition- based simulated kalman filters and their application in system identification by Kamil Zakwan, Mohd Azmi

    Published 2017
    “…Among the various kinds of optimization algorithms, Simulated Kalman Filter (SKF) is a new population-based optimization algorithm inspired by the estimation capability of Kalman Filter. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10

    Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms by Ridha, Hussein Mohammed

    Published 2020
    “…Performance results show that the MADE algorithm based on lead-acid battery has a high level of LLP and minimum cost among other types of storage batteries. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Last throughput and quality-of-service aware (LTQA) scheduling algorithm in long term evolution (LTE) femtocell network / Muhammad Naqiuddin Sahrani by Sahrani, Muhammad Naqiuddin

    Published 2022
    “…The simulation of the scheduling algorithm was conducted using NS-3 and the performance of these packet scheduling algorithms was evaluated based on the performance metrics of throughput, delay, PLR and fairness for the VoIP, video and FTP applications. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Towards Wind Energy-based Charging Stations: A Review of Optimization Methods by Alhasan A.M.W., Umar D.A., Alkawsi G., Alkahtani A.A., Alomari M.A., Aris H.

    Published 2024
    “…Evidently, each algorithm or software application bears distinctive merits and demerits. …”
    Article
  13. 13
  14. 14

    Performance Comparison of Nature-inspired Optimization Algorithms Applied to MVDR Technique for Canceling Multiple Access Interference Signals by Suhail Najm, Shahab, Ayib Rosdi, Zainun, Nurul Hazlina, Noordin, Izzeldin, I. Mohd

    Published 2018
    “…Findings: In comparison to conventional MVDR, the proposed algorithms have indicated that MVDRGSA providesfavorable agreement of synthesizing a maximum gain toward the desired real user angle while introducing deep null-forming in the undesired user directions. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Optimizing tree planting areas through integer programming and improved genetic algorithm by Md Badarudin, Ismadi

    Published 2012
    “…In conclusion, the hybrid algorithm based solution strategies improved efficiency with convincing results, therefore, this will assist planners for better decision making to optimize area to achieve more trees to be planted. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    A Benchmarking Methodology for NPU-Based Stateful Firewall by Lee, Eng Kean, Mohd. Nor, Sulaiman

    Published 2003
    “…t is currently a challenge to evaluate and compare network processor-based (a.k.a. NPU-based) applications due to the heterogeneity of the application designs and hardware architectures. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item