Search Results - (( its application ((a algorithm) OR (based algorithm)) ) OR ( some application among algorithm ))

Refine Results
  1. 1
  2. 2

    A novel swarm-based optimisation algorithm inspired by artificial neural glial network for autonomous robots by Ismail, Amelia Ritahani, Tumian, Afidalina

    Published 2019
    “…Artificial neuro-glial networks is proposed to be combined in the swarm-based communication algorithm to provide a human-like model for the robot's communication and optimization.…”
    Get full text
    Get full text
    Monograph
  3. 3

    A novel N-input voting algorithm for X-by-wire fault-tolerant systems by Karimi, Abbas, Zarafshan, Faraneh, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Ramli, Abdul Rahman

    Published 2014
    “…In this paper, a novel voting algorithm is introduced for real-time fault-tolerant control systems, appropriate for applications in which N is large. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Content-based recommender system for an academic social network / Vala Ali Rohani by Vala Ali, Rohani

    Published 2014
    “…In this study, a new algorithm is proposed to represent an enhanced version of content-based recommender systems by utilizing social networking features. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Spatial network k-Nearest neighbor: A survey and future directives by Borhanuddin B., Solemon B.

    Published 2023
    “…There are many types of nearest neighbor algorithms. One of them is called k-nearest neighbor (k- NN), a technique that helps to find number of k closest objects from a user location within a specified range of area. k- NN road network algorithm studies have been through various query performance discussions. …”
    Conference Paper
  6. 6
  7. 7
  8. 8

    Denoising of digital images using second generation wavelet transforms-hidden markov model by Khmag, Asem Ib Mohamed

    Published 2016
    “…In this issue, a newly developed algorithm based on second-generation wavelet transformation using semi-soft thresholding is introduced. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11
  12. 12

    An Evolutionary Stream Clustering Technique for Outlier Detection by Supardi, N.A., Abdulkadir, S.J., Aziz, N.

    Published 2020
    “…Most of the traditional density-based clustering is not applicable in data streams due to its own characteristics. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…The MAC value is stored in the authentication data files of the Authentication Header and Encapsulating Security Payload. This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…The MAC value is stored in the authentication data files of the Authentication Header and Encapsulating Security Payload. This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Dynamic area coverage algorithms for static and mobile wireless sensor network environments using voronoi techniques by Ceesay, Omar M.

    Published 2011
    “…This thesis focuses on developing Voronoi Tessellation-based Coverage Optimization Algorithms for Static and Mobile Wireless Sensor Networks, where a large number of static nodes are supported by few mobile nodes in carrying out the sensing task. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18
  19. 19

    Seamless horizontal handover algorithm for homogeneous wireless mobile networks using fuzzy logic by Ibrahim, Mohammed Khaleel

    Published 2013
    “…One of the main challenges for robust mobility is the availability of simple and seamless handover algorithms, which allow a mobile node to connect among homogeneous or heterogeneous wireless networks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20