Search Results - (( its application need algorithm ) OR ( its application ((_ algorithm) OR (based algorithm)) ))
Search alternatives:
- application need »
- its application »
- need algorithm »
-
1
-
2
-
3
-
4
Modifying iEclat algorithm for infrequent patterns mining
Published 2018“…This paper proposes an enhancement algorithm based on iEclat algorithms for mining infrequent pattern.…”
Get full text
Get full text
Conference or Workshop Item -
5
Fsm-Based Enhanced March C- Algorithm For Memory Built-In Self-Test
Published 2017Get full text
Get full text
Thesis -
6
-
7
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…In addition, with regard to the second algorithm SNBR, the results show that SNBR overcomes the NCPR algorithm terms of normalize routing overhead by 58.80% as its due to its dropping factor. …”
Get full text
Get full text
Get full text
Thesis -
8
CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK
Published 2023“…This enables smart grid to communicate with each of its devices and applications in monitoring and controlling the components remotely. …”
text::Thesis -
9
Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm
Published 2022“…PID is considered as simple yet powerful controller for many kinds of applications. In designing PID, user needs to set appropriate controller gain to achieve a desired performance of the control system, in terms of time response and its steady state error. …”
Get full text
Get full text
Book Chapter -
10
-
11
A new vertical edge detection algorithm and its application
Published 2008Get full text
Get full text
Conference or Workshop Item -
12
Home buyer assistant using artificial bee colony algorithm / Muhammad Izzat Azri Azman
Published 2017“…After that, in exploitation process, the algorithms will exploit the generated population to search for a desired home according to the preferences and its priority. …”
Get full text
Get full text
Thesis -
13
-
14
-
15
-
16
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
17
Solar photovoltaic system based on perturb and observe maximum power point tracking with trapezoidal rule approach under partial shading conditions
Published 2022“…Among all proposed algorithms, perturb and observe (P&O) algorithm is the most popular due to its simplicity and good convergence. …”
Get full text
Get full text
Get full text
Thesis -
18
-
19
-
20
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item
