Search Results - (( some application using algorithmic ) OR ( its applications using algorithm ))*
Search alternatives:
- some application »
- its applications »
- using algorithm »
-
1
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…Fingerprint verification has drawn a lot of attention on its approach in biometric since it is one of the most important biometric technologies nowadays and it is widely used in several different applications and areas. …”
Get full text
Get full text
Thesis -
3
Three-term backpropagation algorithm for classification problem
Published 2006“…Standard Backpropagation Algorithm (BP) is a widely used algorithm in training Neural Network that is proven to be very successful in many diverse application. …”
Get full text
Get full text
Thesis -
4
The fusion of particle swarm optimization (PSO) and interior point method (IPM) as cooperative movement control algorithm in Swarm Robotics / Dada Emmanuel Gbenga
Published 2016“…Secondly, we compared the performance of our new algorithm pdAPSO with APSO, and PSO using 7 benchmark functions. …”
Get full text
Get full text
Thesis -
5
Autonomous Robot Navigation in Unknown Maze Environment
Published 2012Get full text
Get full text
Final Year Project -
6
Two objectives big data task scheduling using swarm intelligence in cloud computing
Published 2016“…It has been widely used for its enormous benefits and its ability to cope with large scale data such as workflows and big data applications. …”
Get full text
Get full text
Get full text
Article -
7
A block-based multi-scale background extraction algorithm
Published 2010“…Conclusion: Using Multi scaling filtering and applying the filters just to some selected nonoverlapped blocks reduce the time consumption of the extracting background algorithm. …”
Get full text
Get full text
Article -
8
A modified generalized RBF model with EM-based learning algorithm for medical applications
Published 2006“…An EM-based training algorithm is also introduced, which uses fewer parameters compared to some classical supervised learning methods. …”
Get full text
Get full text
Get full text
Proceeding Paper -
9
Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF)
Published 2019“…The TF-IDF algorithm is used to filter Android features filtered before detection process. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
11
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
12
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…The steps to calculate a shortest path using A • algorithm is shown by using appropriate examples and related figures. …”
Get full text
Get full text
Thesis -
13
Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm
Published 2022“…In this study, a new proposed hybrid optimization algorithm, called Extended Bat Algorithm (EBA) is used for optimizing the PID controller for the wheel mobile robot. …”
Get full text
Get full text
Book Chapter -
14
Evaluation of feature selection algorithm for android malware detection
Published 2018“…The Android features were filtered before detection process using TF-IDF algorithm. However, IDF is unaware to the training class labels and give incorrect weight value to some features. …”
Get full text
Article -
15
Simulated Kalman Filter algorithms for solving optimization problems
Published 2019“…The Wilcoxon signed ranked statistical test shows that the ssSKF algorithm that uses an adaptive local neighbourhood in the prediction phase performs statistically better than the SKF algorithm that uses the last estimated state as its prediction, especially in solving high dimensional functions. …”
Get full text
Get full text
Thesis -
16
-
17
Cryptography: A New Approach of Classical Hill Cipher
Published 2013Get full text
Get full text
Article -
18
-
19
-
20
Multi-Phase Information Theory-Based Algorithm for Edge Detection of Aerial Images
Published 2022“…Such findings make the proposed algorithm desirable to be used as a key image detection method with other image-related applications.…”
Get full text
Get full text
Article
