Search Results - (( its application based algorithm ) OR ( some application towards algorithm ))*

Refine Results
  1. 1

    Enhancing Solutions Of Capacity Vehicle Routing Problem Based On An Improvement Ant Colony System Algorithm by Mutar, Modhi Lafta, Mohd Aboobaider, Burhanuddin, Hameed, Asaad Shakir, Yusof, Norzihani

    Published 2019
    “…It serves an important task in logistics and supply procession administration appropriate toward its wide applications in transport, product delivery, and services. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Marine Predator Algorithm and Related Variants: A Systematic Review by Philibus, Emmanuel, Mohd Zain, Azlan, Prasetya, Didik Dwi, Bahari, Mahadi, Yusup, Norfadzlan, Abdul Jalil, Rozita, Abdul Majid, Mazlina, A Samah, Azurah

    Published 2025
    “…The Marine Predators Algorithm (MPA) is classified under swarm intelligence methods based on its type of inspiration. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6

    Stray animal complaint system using geolocation technique with rule-based Algorithm / Albin Lemuel Kushan … [et al.] by Kushan, Albin Lemuel, Mahadi, Mohamad Tajuddin, Zulhemay, Mohd Nabil, Sadikan, Siti Fairuz Nurr, Mishan, Mohd Taufik

    Published 2021
    “…Subsequently, local council are also keen to veer towards this adaptation by introducing more technologically based type of services such as parking system using mobile application. …”
    Get full text
    Get full text
    Get full text
    Book Section
  7. 7

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Simulated Kalman Filter with modified measurement, substitution mutation and hamming distance calculation for solving traveling salesman problem by Suhazri Amrin, Rahmad, Zuwairie, Ibrahim, Zulkifli, Md. Yusof

    Published 2022
    “…We reviewed 57 SKF papers. 16 of them on fundamental improvements, 9 on extension of the algorithm to discrete problems and 25 on their applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Towards a unified image quality assessment technique for cross-content image processing applications by Baqar, Mohtashim *

    Published 2024
    “…It can reconstruct images with five distortion types, outperforming SOTA AS algorithms, even under high distortion. The first stage uses an application-specific reconstruction algorithm, while the second stage employs an IQA-based model called the observation-based bilateral filter (OBF) with non-linear weights calculated using a Haar-PSI-based maximum a posteriori (MAP) estimator. …”
    Get full text
    Thesis
  11. 11

    DC-based PV-powered home energy system by Sabry, Ahmad H.

    Published 2017
    “…A controller based on an algorithm of one time maximum power point (MPP) is proposed to mitigate those losses. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Differential evolution for neural networks learning enhancement by Ismail Wdaa, Abdul Sttar

    Published 2008
    “…Evolutionary computation is the name given to a collection of algorithms based on the evolution of a population toward a solution of a certain problem. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Cut-off solar charge controller as an alternative towards system efficiency optimization by Sabry, Ahmad H., Almassri, Ahmed M., Wan Hasan, Wan Zuha, Mohd Radzi, Mohd Amran, Ab Kadir, Mohd Zainal Abidin, Shafie, Suhaidi

    Published 2014
    “…Based on the concept of optimizing the efficiency of the automated solar system in residential buildings application, this paper proposed a High efficiency solar Cut-Off charge controller as an alternative to the main solar charge controller in most conventional buildings solar system, the idea is to design an electronic circuit with low losses as a compared with the conventional charge controller to be a part of the integrated and automated building solar system, the design has an algorithm based on some environment parameters like sun Irradiance and weather temperature, this algorithm seems to be inversely calculated because its start from the value of full charge battery voltage. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Implementation of Symmetric Rank-One Methods for Unconstrained Optimization by Khiyaban, Farzin Modarres

    Published 2010
    “…Among QN updates, symmetric rank-one (SR1) update has been shown to be an e®ective and reliable method of such algorithms. However, SR1 is an awkward method, even though its performance is in general better than well known QN updates. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Bayesian network of influence of sociodemographic variables on dengue related knowledge, attitude, and practices in selected areas in Selangor, Malaysia by Ajibola, Lamidi-Sarumoh Alaba

    Published 2019
    “…The data collected was used to learn the structure of BN via some known algorithms using R programming language. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Relationship between tiktok usage and youth well-being involving personality characteristics by Tang, Lian

    Published 2022
    “…TikTok, as one of several social media applications, has attracted numerous users, particularly youths, due to its short and fast video features. …”
    Get full text
    Get full text
    Thesis