Search Results - (( some applications usage algorithm ) OR ( _ application acs algorithm ))
Search alternatives:
- applications usage »
- some applications »
- usage algorithm »
- application acs »
- acs algorithm »
-
1
Simulation analysis for maximizing renewable solar energy to improve the power generation capacity in the state of Kuwait
Published 2018“…This paper aims to present how to improve power generation capacity in the State of Kuwait through simulation analysis for maximizing the usage of renewable energy applications. Power demand in Kuwait increases every year by 6% that causes load-shedding problems in the national utility grid system. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
2
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
Published 2006“…This thesis investigates the effect of different scheduling mechanisms and usage of a different marker algorithms then develop and implement a fair scheduling mechanism and integrate it with a shaper with the usage of a very fair efficient marker at the edge of the DiffServ networks with the usage of simulation and analytical techniques. …”
Get full text
Get full text
Thesis -
3
Achieving security by combining Huffman and SLSB algorithms
Published 2013Get full text
Get full text
Get full text
Article -
4
-
5
New heuristic function in ant colony system for the travelling salesman problem
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…But the major treat of the IPSec is caused by the usage or the algorithm that has weak keys. The algorithms are DES, 3DES, Blowfish, Cast128 and RC5. …”
Get full text
Get full text
Conference or Workshop Item -
7
-
8
-
9
New heuristic function in ant colony system algorithm
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
10
E-Hadith DV: Hadith scriptures in Syafie Madhhab retrieval using data visualization / Nor Faezahtul Salme Norhisam
Published 2020“…Implementation of sentence-based searching and the usage of the stemming algorithm would be considered to produce more meaningful results for future work.…”
Get full text
Get full text
Thesis -
11
Embedding Malaysian House Red Ant Behavior into an Ant Colony System
Published 2008Get full text
Get full text
Citation Index Journal -
12
Shuffling algorithms for automatic generator question paper system.
Published 2010Get full text
Get full text
Article -
13
Path Optimization For Cooperative Multi-Head 3d Printing
Published 2020Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…There are four experiment conducted such as processing time, power usage, memory usage and data modification attack. …”
Get full text
Get full text
Thesis -
15
-
16
-
17
-
18
Scheduling jobs in computational grid using hybrid ACS and GA approach
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Low and high level hybridization of ant colony system and genetic algorithm for job scheduling in grid computing
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Multi-objective optimization of stand-alone hybrid renewable energy system by genetic algorithm
Published 2013“…Some of thes obstacles are cost, reliability and performance. …”
Get full text
Get full text
Thesis
