Search Results - (( its application ((a algorithm) OR (based algorithm)) ) OR ( some application among algorithm ))
Search alternatives:
- application among »
- some application »
- its application »
- among algorithm »
- a algorithm »
-
1
Fsm-Based Enhanced March C- Algorithm For Memory Built-In Self-Test
Published 2017Get full text
Get full text
Thesis -
2
A novel swarm-based optimisation algorithm inspired by artificial neural glial network for autonomous robots
Published 2019“…Artificial neuro-glial networks is proposed to be combined in the swarm-based communication algorithm to provide a human-like model for the robot's communication and optimization.…”
Get full text
Get full text
Monograph -
3
A novel N-input voting algorithm for X-by-wire fault-tolerant systems
Published 2014“…In this paper, a novel voting algorithm is introduced for real-time fault-tolerant control systems, appropriate for applications in which N is large. …”
Get full text
Get full text
Get full text
Article -
4
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…In this study, a new algorithm is proposed to represent an enhanced version of content-based recommender systems by utilizing social networking features. …”
Get full text
Get full text
Thesis -
5
Spatial network k-Nearest neighbor: A survey and future directives
Published 2023“…There are many types of nearest neighbor algorithms. One of them is called k-nearest neighbor (k- NN), a technique that helps to find number of k closest objects from a user location within a specified range of area. k- NN road network algorithm studies have been through various query performance discussions. …”
Conference Paper -
6
-
7
A survey: Challenges of image segmentation based fuzzy c-means clustering algorithm
Published 2024journal::journal article -
8
Denoising of digital images using second generation wavelet transforms-hidden markov model
Published 2016“…In this issue, a newly developed algorithm based on second-generation wavelet transformation using semi-soft thresholding is introduced. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
Enhanced weight-based clustering algorithm to provide reliable delivery for VANET safety applications
Published 2019“…Each vehicle was associated with a predefined weight value based on its relevance. …”
Get full text
Get full text
Article -
12
An Evolutionary Stream Clustering Technique for Outlier Detection
Published 2020“…Most of the traditional density-based clustering is not applicable in data streams due to its own characteristics. …”
Get full text
Get full text
Conference or Workshop Item -
13
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…The MAC value is stored in the authentication data files of the Authentication Header and Encapsulating Security Payload. This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…The MAC value is stored in the authentication data files of the Authentication Header and Encapsulating Security Payload. This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Dynamic area coverage algorithms for static and mobile wireless sensor network environments using voronoi techniques
Published 2011“…This thesis focuses on developing Voronoi Tessellation-based Coverage Optimization Algorithms for Static and Mobile Wireless Sensor Networks, where a large number of static nodes are supported by few mobile nodes in carrying out the sensing task. …”
Get full text
Get full text
Thesis -
16
-
17
Vehicle routing problem: models and solutions
Published 2008Get full text
Get full text
Get full text
Article -
18
-
19
Seamless horizontal handover algorithm for homogeneous wireless mobile networks using fuzzy logic
Published 2013“…One of the main challenges for robust mobility is the availability of simple and seamless handover algorithms, which allow a mobile node to connect among homogeneous or heterogeneous wireless networks. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
