Search Results - (( using function a algorithm ) OR ( knowledge implementation modified algorithm ))
Search alternatives:
- knowledge implementation »
- implementation modified »
- using function »
- a algorithm »
- function a »
-
1
-
2
Security analysis of data transmission in an IoT based platform for telemedicine
Published 2021“…This study proposes a modified folded pipeline architecture for resource restriction applications with an AES algorithm. …”
Get full text
Get full text
Get full text
Article -
3
Knowledge-based system developement for the game congkak / Syah Ali Reza Yaacob
Published 2006“…The agent will use Minimax and α-β pruning as the search algorithms. …”
Get full text
Get full text
Thesis -
4
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The study recommends to use another type of digital signature algorithm to be used in the proposed method. …”
Get full text
Get full text
Student Project -
5
Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line
Published 2020“…This study proposed a modified standalone Machine Learning-based Adaptive Protection Scheme (ML-APS) relay' fault classifier model using novel useful hidden Knowledge Discovery from historical fault events Dataset (KDD) from healthy and faulty lines. …”
Get full text
Get full text
Thesis -
6
Zero distortion-based steganography for handwritten signature
Published 2018“…To the best of our knowledge, this is the first time that a human handwritten signature sample is used for steganography application. …”
Get full text
Get full text
Get full text
Thesis -
7
The effect of total bits and number of LFSRs on the hardware performance of modified A5/1 stream ciphers
Published 2024journal::journal article -
8
Manufacturing process planning optimisation in reconfigurable multiple parts flow lines
Published 2008“…Two modified genetic algorithms are devised and employed to provide the best approximate process planning solution. …”
Get full text
Get full text
Get full text
Article -
9
Process Planning Optimization In Reconfigurable Manufacturing Systems
Published 2008“…The five (5) AADTs include; a variant of the simulated annealing algorithm that implements heuristic knowledge at critical decision points, two (2) cooperative search schemes based on a “loose hybridization” of the Boltzmann Machine algorithm with (i) simulated annealing, and (ii) genetic algorithm search techniques, and two (2) modified genetic algorithms. …”
Get full text
Get full text
Thesis -
10
Image Based Congestion Detection Algorithms And Its Real Time Implementation
Published 2015“…The methodology includes vehicle detection by using backlight pairing feature algorithm and modified Watershed algorithm. The results returned by the algorithms are transmitted and received wirelessly using the SFFSDR platform, including the use of RF, FPGA, and DSP modules for variable distances. …”
Get full text
Get full text
Thesis -
11
-
12
Investigation On Optical Fibre Configurations For Process Tomography
Published 2002“…Linear back projection (LBP) algorithm is used to reconstruct the image. A modified reconstruction algorithm combining LBP and a priori knowledge is outlined. …”
Get full text
Get full text
Get full text
Article -
13
Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions
Published 2018“…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
Get full text
Get full text
Thesis -
14
-
15
A block cipher based on genetic algorithm
Published 2016“…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
Get full text
Get full text
Get full text
Thesis -
16
Effect Of The Number Of Tapping Bits Of The A5/1 Stream Cipher Towards Hardware Performance
Published 2024“…Objective: In this paper, two modified designs proposed by the author are implemented into hardware and the resulting rate of power consumption is compared with that of the conventional design of the A5/1 stream cipher. …”
Get full text
Article -
17
FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources
Published 2026“…We have evaluated the FaaSBid model and the proposed algorithms and pricing model by comparing with a number of existing models and algorithms using real-world datasets. …”
Get full text
Get full text
Get full text
Article -
18
Single Fitness Function to Optimize Energy using Genetic Algorithms for Wireless Sensor Network
Published 2024journal::journal article -
19
Computing the autopilot control algorithm using predictive functional control for unstable model
Published 2009“…This paper discusses the computing development of a control algorithm using Predictive Functional Control (PFC) for model-based that having one or more unstable poles. …”
Get full text
Get full text
Conference or Workshop Item -
20
Computation of Maass Cusp Forms on Singly Punctured Two-Torus and Triply Punctured Two-Sphere Using Mathematica
Published 2009“…All the computations were implemented in Mathematica and built in a way accessible to any one with an introductory knowledge in Mathematica. …”
Get full text
Get full text
Thesis
