Search Results - (( some application ((among algorithm) OR (bat algorithm)) ) OR ( _ application tools algorithm ))*
Search alternatives:
- application tools »
- some application »
- among algorithm »
- tools algorithm »
- bat algorithm »
-
1
Benchmarking of Bat-inspired Interaction Testing Strategy
Published 2016Get full text
Get full text
Get full text
Article -
2
-
3
A Mobile Application For Stock Price Prediction
Published 2021“…The results show ARIMA has the least error among all five prediction algorithms. Therefore, ARIMA is the best prediction model to implement in the mobile application for stock price prediction. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Application of adaptive bats sonar algorithm to minimise car side impact design
Published 2017“…This project was focusing on the modification of bats sonar algorithm (BSA) and renamed to adaptive bats sonar algorithm (ABSA) due to some limitations of previous algorithm. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
5
Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm
Published 2022“…Three different optimization algorithms which are Bat Algorithm (BA), Bat Algorithm with Mutation (BAM) and Extended Bat Algorithm (EBA) are implemented to optimize the value of PID controller gain for wheel mobile robot. …”
Get full text
Get full text
Book Chapter -
6
Multi-objective optimization of stand-alone hybrid renewable energy system by genetic algorithm
Published 2013“…HOGA, as a new effective tool for multi-objective optimization by evolutionary algorithm is used in this research. …”
Get full text
Get full text
Thesis -
7
-
8
-
9
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006Get full text
Get full text
Monograph -
10
PID controller design for mobile robot using Bat Algorithm with Mutation (BAM)
Published 2019“…Here, an optimization algorithm called Bat Algorithm with Mutation (BAM) is proposed to optimize the value of PID controller gain for mobile robot. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
An approximation approach for free space wave propagation
Published 2009“…In this paper, we propose a new algorithm with high order characteristic. The efficiency of the new algorithm is tested and compared with the efficiency of high order FDTD method by some numerical experiment. …”
Get full text
Get full text
Conference or Workshop Item -
13
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Article -
14
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Seismic attribute feasibility study for fault and fracture analysis and integration with spectral decomposition: Application in Sarawak basin
Published 2019Get full text
Get full text
Conference or Workshop Item -
16
-
17
Biometrics: Facial Recognition
Published 2004“…It also lists the various approaches in handling facial recognition where we see different methods applied and opinions on which method is better and what factors influenced them. Among the various approaches, eigenface technique is explained in detail including its work procedure, algorithm and the tools applied. …”
Get full text
Get full text
Final Year Project -
18
Review of Multi-Objective Swarm Intelligence Optimization Algorithms
Published 2021Get full text
Get full text
Article -
19
-
20
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…The proposed EBGWO algorithm can be used for FS in anomaly detection tasks that involve any dataset size from various application domains.…”
Get full text
Get full text
Thesis
