Search Results - (( its applications among algorithm ) OR ( _ application during algorithm ))*
Search alternatives:
- applications among »
- application during »
- its applications »
- during algorithm »
- among algorithm »
-
1
-
2
A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail
Published 1998“…A security criteria, outlines the authentication algorithm and key to be used during the registration process. …”
Get full text
Get full text
Thesis -
3
Ant system with heuristics for capacitated vehicle routing problem
Published 2013Get full text
Get full text
Thesis -
4
-
5
-
6
-
7
Analysing machine learning models to detect disaster events using social media
Published 2023text::Thesis -
8
-
9
Photovoltaic-based single-ended primary-inductor converter with dual-fuzzy logic control-based maximum power point tracking
Published 2016“…Among artificial intelligent algorithms used in MPPT are neural network, fuzzy logic control (FLC) and genetic algorithm. …”
Get full text
Get full text
Thesis -
10
Designing and implementation of robot mapping algorithm for mobile robot
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
11
-
12
Dynamical fuzzy autocatalytic set of combustion process in circulating fluidized bed boiler using transition matrix / Hazwani Hashim
Published 2014“…Thus it leads to the establishment of an improvised Graph Dynamics Algorithm which is used to assist the analysis of graph dynamics of FACS in CFB. …”
Get full text
Get full text
Thesis -
13
Denoising of digital images using second generation wavelet transforms-hidden markov model
Published 2016“…After applying the denoising algorithm on the contaminated image, the cycling spinning algorithm is applied to increase the visual quality of the restored image. …”
Get full text
Get full text
Thesis -
14
The Estimation of Air Temperature from NOAA/AVHRR Images and the study of NDVI-Ts impact
Published 2011“…From the brightness temperature in the images thermal bands 4&5 and using ε the surface temperature Ts was extracted using three different split-window algorithms. The application of the three formulas showed a homogenous results specially when using Becker et al (1990) and Uliveri et al. (1994) algorithms. …”
Get full text
Get full text
Article -
15
Reactive power imbalance method for islanding detection in micro-grid operation
Published 2014“…Its major function is to ensure the stable operation during the fault and a variety of utility grid disruption. …”
Get full text
Get full text
Get full text
Article -
16
Vehicle routing problem: models and solutions
Published 2008Get full text
Get full text
Get full text
Article -
17
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Article -
18
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…There are various hash functions, including Message-Digest 5 (MD5), RACE Integrity Primitives Evaluation Message Digest 160 (RIPEMD-160), Secure Hash Algorithm 1 (SHA-1), and Secure Hash Algorithm 256 (SHA-256), among others. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Seamless horizontal handover algorithm for homogeneous wireless mobile networks using fuzzy logic
Published 2013“…The most important and society application of WiMAX is the mobile communication. When a mobile station changes its geographical position, it may also need to change its attachment point in the network in order to retain the quality of the connection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
