Search Results - (( some applications out algorithm ) OR ( based application kano algorithm ))*
Search alternatives:
- some applications »
- based application »
- applications out »
- application kano »
- kano algorithm »
- out algorithm »
-
1
Cryptography: A New Approach of Classical Hill Cipher
Published 2013Get full text
Get full text
Article -
2
On density-based data streams clustering algorithms: A survey
Published 2017“…The purpose of this paper is to shed light on some algorithms in the literature on density-based clustering over data streams. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
4
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010Get full text
Get full text
Undergraduates Project Papers -
5
Map navigation for mobile tourist / Rohana Abd Jalil
Published 2007“…This system is used an rule base algorithm to get an output. The result of this system is come out with the prototype system that adapts the rule base algorithm. …”
Get full text
Get full text
Thesis -
6
Dynamic replication algorithm in data grid: Survey
Published 2008Get full text
Get full text
Get full text
Book Section -
7
Symbiotic organisms search optimization algorithm in cloud computing: a nature-inspired meta-heuristic
Published 2022“…This paper proposes to investigate symbiotic organisms search algorithms used in handling various optimisation problems in different fields to bring out strengths and weaknesses of the existing algorithms as well as to point out future directions for the upcoming studies in the domain. …”
Get full text
Get full text
Article -
8
-
9
Adaptive beamforming algorithm based on Simulated Kalman Filter
Published 2017“…Some of the metaheuristic algorithms have been modified from the original algorithms to improve the algorithms performance in adaptive beamforming application. …”
Get full text
Get full text
Thesis -
10
-
11
A novel normal parameter reduction algorithm of soft sets
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
12
A comparative performance analysis of computational intelligence techniques to solve the asymmetric travelling salesman problem
Published 2021“…This is quite disturbing because most real-life applications are actually asymmetric in nature. These six algorithms were chosen for their performance comparison because they have posted some of the best results in literature and they employ different search schemes in attempting solutions to the ATSP. …”
Get full text
Get full text
Get full text
Article -
13
-
14
-
15
-
16
Web application vulnerabilities detection model
Published 2016“…In addition, the proposed detection model will be able to generate the report regarding the level of vulnerability of the web application. The research will be carried out by using design string matching algorithm. …”
Get full text
Get full text
Research Reports -
17
Enhancing solid oxide fuel cell efficiency through advanced model identification using differential evolutionary mutation fennec fox algorithm
Published 2025“…The computational time of the proposed algorithm is 1.001 s, followed by the parent algorithm FFA (1.199 s) and some of the compared algorithms. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Formulating and solving stochastic truck and trailer routing problems using meta-heuristic algorithms / Seyedmehdi Mirmohammadsadeghi
Published 2015“…Here, firstly, two experimental tests have been carried out to show the validity and consistency of the applied algorithms for solving TTRPSDTW. …”
Get full text
Get full text
Get full text
Thesis -
19
-
20
Numerical analysis
Published 2008“…Mathematics has applications in virtually every scientific discipline. …”
Get full text
Get full text
Get full text
Article
