Search Results - (( its applications among algorithm ) OR ( its application during algorithm ))*
Search alternatives:
- applications among »
- application during »
- its applications »
- during algorithm »
- among algorithm »
- its application »
-
1
A study of mobile IP and its security aspects in a LAN environment / Suhaila Che Ismail
Published 1998“…A security criteria, outlines the authentication algorithm and key to be used during the registration process. …”
Get full text
Get full text
Thesis -
2
-
3
Ant system with heuristics for capacitated vehicle routing problem
Published 2013Get full text
Get full text
Thesis -
4
Photovoltaic-based single-ended primary-inductor converter with dual-fuzzy logic control-based maximum power point tracking
Published 2016“…Due to its maintenance free, ease of implementation and free of pollution, its demand increases rapidly in residential and industrial applications. …”
Get full text
Get full text
Thesis -
5
-
6
-
7
-
8
Analysing machine learning models to detect disaster events using social media
Published 2023text::Thesis -
9
-
10
Designing and implementation of robot mapping algorithm for mobile robot
Published 2014Get full text
Get full text
Get full text
Proceeding Paper -
11
Denoising of digital images using second generation wavelet transforms-hidden markov model
Published 2016“…After applying the denoising algorithm on the contaminated image, the cycling spinning algorithm is applied to increase the visual quality of the restored image. …”
Get full text
Get full text
Thesis -
12
-
13
Dynamical fuzzy autocatalytic set of combustion process in circulating fluidized bed boiler using transition matrix / Hazwani Hashim
Published 2014“…Here, specific transition matrix of FACS in CFB is developed and its basic properties which relates to Perron-Frobenius theorem are investigated. …”
Get full text
Get full text
Thesis -
14
Vehicle routing problem: models and solutions
Published 2008Get full text
Get full text
Get full text
Article -
15
Reactive power imbalance method for islanding detection in micro-grid operation
Published 2014“…Its major function is to ensure the stable operation during the fault and a variety of utility grid disruption. …”
Get full text
Get full text
Get full text
Article -
16
Seamless horizontal handover algorithm for homogeneous wireless mobile networks using fuzzy logic
Published 2013“…The most important and society application of WiMAX is the mobile communication. When a mobile station changes its geographical position, it may also need to change its attachment point in the network in order to retain the quality of the connection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
The Estimation of Air Temperature from NOAA/AVHRR Images and the study of NDVI-Ts impact
Published 2011“…From the brightness temperature in the images thermal bands 4&5 and using ε the surface temperature Ts was extracted using three different split-window algorithms. The application of the three formulas showed a homogenous results specially when using Becker et al (1990) and Uliveri et al. (1994) algorithms. …”
Get full text
Get full text
Article -
18
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Article -
19
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
