Search Results - (( its application among algorithm ) OR ( based application during algorithm ))*
Search alternatives:
- application during »
- application among »
- based application »
- during algorithm »
- its application »
- among algorithm »
-
1
Ant system with heuristics for capacitated vehicle routing problem
Published 2013Get full text
Get full text
Thesis -
2
Photovoltaic-based single-ended primary-inductor converter with dual-fuzzy logic control-based maximum power point tracking
Published 2016“…Among artificial intelligent algorithms used in MPPT are neural network, fuzzy logic control (FLC) and genetic algorithm. …”
Get full text
Get full text
Thesis -
3
Analysing machine learning models to detect disaster events using social media
Published 2023text::Thesis -
4
-
5
Designing and implementation of robot mapping algorithm for mobile robot
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
6
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Denoising of digital images using second generation wavelet transforms-hidden markov model
Published 2016“…In this issue, a newly developed algorithm based on second-generation wavelet transformation using semi-soft thresholding is introduced. …”
Get full text
Get full text
Thesis -
9
Vehicle routing problem: models and solutions
Published 2008Get full text
Get full text
Get full text
Article -
10
-
11
Seamless horizontal handover algorithm for homogeneous wireless mobile networks using fuzzy logic
Published 2013“…The most important and society application of WiMAX is the mobile communication. When a mobile station changes its geographical position, it may also need to change its attachment point in the network in order to retain the quality of the connection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
-
13
-
14
A review of slicing techniques in software engineering
Published 2015“…Quite a large numbers of variants for the program slicing have been analyzed along with the algorithms to compute the slice. Model based slicing split the large architectures of software into smaller sub models during early stages of SDLC. …”
Get full text
Get full text
Get full text
Proceeding Paper -
15
-
16
-
17
Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System
Published 2010“…Each class has a head, which is elected among its own class nodes/members. Head plays the role of a registry in its class and communicates with the other heads of the classes in a peer to peer manner during the discovery process. …”
Get full text
Get full text
Thesis -
18
Semantic-Based, Scalable, Decentralized and Dynamic Resource Discovery for Internet-Based Distributed System
Published 2010“…Each class has a head, which is elected among its own class I nodes/members. Head plays the role of a registry in its class and communicates with I the other heads of the classes in a peer to peer manner during the discovery process. …”
Get full text
Get full text
Thesis -
19
-
20
