Search Results - (( its application a algorithm ) OR ( its ((application need) OR (application use)) algorithm ))*
Search alternatives:
- application need »
- its application »
- application use »
- application a »
- a algorithm »
-
1
A new vertical edge detection algorithm and its application
Published 2008Get full text
Get full text
Conference or Workshop Item -
2
A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail
Published 1998“…Each mobile IP agent needs a different application and independently configured. …”
Get full text
Get full text
Thesis -
3
A standard deviation selection in evolutionary algorithm for grouper fish feed formulation
Published 2016“…Malaysia is one of the major producer countries for fishery production due to its location in the equatorial environment.Grouper fish is one of the potential markets in contributing to the income of the country due to its desirable taste, high demand and high price.However, the demand of grouper fish is still insufficient from the wild catch.Therefore, there is a need to farm grouper fish to cater to the market demand.In order to farm grouper fish, there is a need to have prior knowledge of the proper nutrients needed because there is no exact data available.Therefore, in this study, primary data and secondary data are collected even though there is a limitation of related papers and 30 samples are investigated by using standard deviation selection in Evolutionary algorithm.Thus, this study would unlock frontiers for an extensive research in respect of grouper fish feed formulation.Results shown that the fitness of standard deviation selection in evolutionary algorithm is applicable.The feasible and low fitness, quick solution can be obtained. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm
Published 2022“…In this study, a new proposed hybrid optimization algorithm, called Extended Bat Algorithm (EBA) is used for optimizing the PID controller for the wheel mobile robot. …”
Get full text
Get full text
Book Chapter -
5
Computation Enhancement using Reconfigurable Computing
Published 2015“…The chosen algorithm is Fourier Fast Transform due to its part in many DSP applications and its suitability for the project objective. …”
Get full text
Get full text
Final Year Project -
6
Modifying iEclat algorithm for infrequent patterns mining
Published 2018“…A few parts of this algorithm need a modification to assure that it is suitable for mining infrequent pattern. …”
Get full text
Get full text
Conference or Workshop Item -
7
-
8
A Standard Deviation Selection in Evolutionary Algorithm for Grouper Fish Feed Formulation
Published 2016“…Results shown that the fitness of standard deviation selection in evolutionary algorithm is applicable. The feasible and low fitness, quick solution can be obtained. …”
Get full text
Get full text
Get full text
Article -
9
-
10
CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK
Published 2023“…The designated algorithm is tested with Multi-Protocol Label Switching (MPLS) protocol using Network Simulator 3 (NS-3) as a simulation platform. …”
text::Thesis -
11
University class timetable tool
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
-
13
Parallel genetic algorithms for shortest path routing in high- performance computing / Mohd Erman Safawie Che Ibrahim
Published 2012“…Nowadays, there are a lot of applications that affect the speedup of a computer which reduce its performance. …”
Get full text
Get full text
Thesis -
14
Colour-based wound assessment application for android smartphone / Nicholas Aaron Nigel
Published 2016“…Data on real wound images obtained over the internet were processed using the proposed application to gauge its accuracy in assessing the wound stage. …”
Get full text
Get full text
Thesis -
15
-
16
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
17
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
18
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article -
19
-
20
