Search Results - (( some ((application need) OR (application use)) algorithm ) OR ( _ application new algorithm ))
Search alternatives:
- application need »
- application use »
- application new »
- new algorithm »
-
1
Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm
Published 2022“…In this study, a new proposed hybrid optimization algorithm, called Extended Bat Algorithm (EBA) is used for optimizing the PID controller for the wheel mobile robot. …”
Get full text
Get full text
Book Chapter -
2
-
3
HISEC: a new lightweight block cipher algorithm
Published 2014“…Lightweight block cipher algorithms are vital for constrained environment. There are many applications need secured lightweight block cipher algorithm like credit card, E-passport and etc. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
4
Cryptography: A New Approach of Classical Hill Cipher
Published 2013Get full text
Get full text
Article -
5
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…Finally, the implementation result in this research shows the average time needed to encrypt and decrypt a voice packet size using a proposed algorithm with the long key of 1024-bits is much smaller than AES_Rijndael algorithm with a short key length of 128-bits.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
An Efficient Computational Algorithm for Solving Arbitrary Sylvester Matrix Equations in Fuzzy Control Theory (S/O 14179)
Published 2021“…With that, the constructed algorithm is considered as a new contribution to the application of control system theory…”
Get full text
Get full text
Monograph -
7
Efficient prime-based method for interactive mining of frequent patterns.
Published 2011“…This is because the appropriate value depends on the type of application and expectation of the user. Moreover, in some real-time applications such as web mining and e-business, finding new correlations between patterns by changing the minimum support threshold is needed. …”
Get full text
Get full text
Article -
8
-
9
Identification of non-linear dynamic systems using fuzzy system with constrained membership functions
Published 2004“…Main research directions in this field include the complexity reduction of fuzzy models models, structure identification of fuzzy system, and application of new or improved training algorithms. …”
Get full text
Get full text
Get full text
Thesis -
10
-
11
Weed recognition based on erosion and dilation segmentation algorithm
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
12
-
13
-
14
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis -
15
-
16
Achieving security by combining Huffman and SLSB algorithms
Published 2013Get full text
Get full text
Get full text
Article -
17
Multi agent quality of service routing based on scheme ant colony optimization algorithm
Published 2014“…Moreover, the proposed approach outperforms the WSP and SWP algorithms, where network efficiency in saturated load gains an 8.39% improvement while the satisfaction of delay and jitter constraints for time critical applications are also achieved. …”
Get full text
Get full text
Thesis -
18
Design and development of prototype robot gripper for object weight measurement
Published 2014“…Therefore, there is a significant need to have a dedicated machine, which is suitable for this application as a safety concern. …”
Get full text
Get full text
Thesis -
19
Adaptive beamforming algorithm based on Simulated Kalman Filter
Published 2017“…Some of the metaheuristic algorithms have been modified from the original algorithms to improve the algorithms performance in adaptive beamforming application. …”
Get full text
Get full text
Thesis -
20
Iterative methods for solving split common fixed point problems in Hilbert spaces
Published 2016“…Our interest here is to apply these mappings to propose some algorithms for solving split common fixed point problems and its variant forms, in the end, we prove the convergence results of these algorithms. …”
Get full text
Get full text
Get full text
Thesis
