Search Results - (( its application ((out algorithm) OR (_ algorithm)) ) OR ( some application use algorithm ))*
Search alternatives:
- some application »
- its application »
- application use »
- out algorithm »
- use algorithm »
-
1
Cryptography: A New Approach of Classical Hill Cipher
Published 2013Get full text
Get full text
Article -
2
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
3
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
4
University class timetable tool
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
-
6
Content-based recommender system for an academic social network / Vala Ali Rohani
Published 2014“…In its formulation, the algorithm considers the interests and preferences of users’ friends and faculty mates in addition to users’ own preferences. …”
Get full text
Get full text
Thesis -
7
Development of heuristic methods based on genetic algorithm (GA) for solving vehicle routing problem
Published 2008“…The computational complexity of most vehicle routing problem and moreover the intricate of stochastic VRP algorithm has made them an important candidate for solution using metaheuristics. …”
Get full text
Get full text
Monograph -
8
-
9
-
10
-
11
-
12
African Buffalo Optimization: A Swarm-Intelligence Technique
Published 2015Get full text
Get full text
Get full text
Article -
13
A study on matrix factorization and its applications
Published 2021“…Both applications use high dimension matrices to calculate the result. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Dynamic area coverage algorithms for static and mobile wireless sensor network environments using voronoi techniques
Published 2011“…This thesis focuses on developing Voronoi Tessellation-based Coverage Optimization Algorithms for Static and Mobile Wireless Sensor Networks, where a large number of static nodes are supported by few mobile nodes in carrying out the sensing task. …”
Get full text
Get full text
Thesis -
15
-
16
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
A survey on improvement of Mahalanobis Taguchi system and its application
Published 2024Subjects:Article -
18
Bayesian Framework based Brain Source Localization Using High SNR EEG Data
Published 2019“…The multipurpose application of brain source localization in the domain of biomedical engineering has aggrandized the ways for its further development for various healthcare applications. …”
Get full text
Get full text
Conference or Workshop Item -
19
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…Fingerprint verification has drawn a lot of attention on its approach in biometric since it is one of the most important biometric technologies nowadays and it is widely used in several different applications and areas. …”
Get full text
Get full text
Thesis -
20
Three-term backpropagation algorithm for classification problem
Published 2006“…Standard Backpropagation Algorithm (BP) is a widely used algorithm in training Neural Network that is proven to be very successful in many diverse application. …”
Get full text
Get full text
Thesis
