Search Results - (( its application tools algorithm ) OR ( _ application during algorithm ))*
Search alternatives:
- application during »
- application tools »
- during algorithm »
- tools algorithm »
-
1
University class timetable tool
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
2
Minimizing machining airtime motion with an ant colony algorithm
Published 2016Get full text
Get full text
Article -
3
RISC-V instruction set extension on blockchain application
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…Thus, these techniques are unable to detect failures that occur due to the improper use of context data, which is becoming an increasingly common issue in mobile applications nowadays. We enhanced the Q-Learning algorithm for action selection based on potential action abilities and proposed a tool, namely CrashDroid, that allows the automation of testing context-aware Android applications. …”
Get full text
Get full text
Get full text
Thesis -
5
Opposition-based spiral dynamic algorithm with an application to optimize type-2 fuzzy control for an inverted pendulum system
Published 2022“…It has the theory of diversification and intensification in its strategy, which allows the algorithm to present itself as a good deterministic type of optimization tool to solve various engineering problems. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
-
7
Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems
Published 2019“…Due to the problem of the unmodeled dynamics, there is a significant disparity between the theory of control and its actual applications, which makes the model-based controller difficult to apply. …”
Get full text
Get full text
Thesis -
8
Safe experimentation dynamics algorithm for data-driven PID controller of a class of underactuated systems
Published 2019“…Due to the problem of the unmodeled dynamics, there is a significant disparity between the theory of control and its actual applications, which makes the model-based controller difficult to apply. …”
Get full text
Get full text
Thesis -
9
Designing and implementation of robot mapping algorithm for mobile robot
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
10
Development of Machine Learning Algorithm for Acquiring Machining Data in Turning Process
Published 2004“…Artificial Neural Network (ANN) was selected from Machine Learning Algorithms to be the learning algorithm. ANN is a computer-based simulation of the living nervous system which works quite differently from conventional programming. …”
Get full text
Get full text
Thesis -
11
-
12
A case study of unmanned aerial vehicle (drone) technology and its applications in the COVID-19 pandemic
Published 2022“…On the other hand, a soft computing approach such as artificial intelligence (A.I.), the internet of things (IoT), neural network, fuzzy logic, genetic algorithm, and machine learning has become crucial in the design and application of UAVs. …”
Get full text
Get full text
Get full text
Article -
13
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
14
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Adaptive artificial neural network for power system security assessment and control action
Published 2012“…This study also investigates the reliability of ANN application in power system security assessment in terms of accuracy and computational time as well as developing a new method that can be included in security assessment tools. …”
Get full text
Get full text
Thesis -
16
-
17
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…We have developed a cloud-based application that adapts the enhanced authentication method, and its security measurement were evaluated using IBM Application Security on Cloud tool. …”
Get full text
Get full text
Get full text
Thesis -
18
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017Get full text
Get full text
Conference or Workshop Item -
19
Modeling and forecasting of injected fuel flow using neural network
Published 2011Get full text
Working Paper -
20
