Search Results - (( wave application ((bat algorithm) OR (path algorithm)) ) OR ( some applications use algorithm ))
Search alternatives:
- some applications »
- wave application »
- applications use »
- path algorithm »
- bat algorithm »
- use algorithm »
-
1
-
2
A generalized laser simulator algorithm for mobile robot path planning with obstacle avoidance
Published 2022“…With application of the all-direction border scan, it outperforms the A-star (A*) and PRM algorithms and provides safer and shorter paths. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
-
4
-
5
Development of a State-Space Observer for Active Noise Control Systems
Published 2009Get full text
Get full text
Thesis -
6
Efficient and scalable ant colony optimization based WSN routing protocol for IoT
Published 2020“…For this reason, many intelligent systems have been utilized to design routing algorithms to handle the network's dynamic state. In this paper, an ant colony optimization (ACO) based WSN routing algorithm for IoT has been proposed and analyzed to enhance scalability, to accommodate node mobility and to minimize initialization delay for time critical applications in the context of IoT to find the optimal path of data transmission, improvising efficient IoT communications. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Low power pipelined FFT processor architecture on FPGA
Published 2018Get full text
Get full text
Conference or Workshop Item -
8
-
9
Three-term backpropagation algorithm for classification problem
Published 2006“…Standard Backpropagation Algorithm (BP) is a widely used algorithm in training Neural Network that is proven to be very successful in many diverse application. …”
Get full text
Get full text
Thesis -
10
-
11
VITILIGO LESION ASSESSMENT TOOL ON SMARTPHONE
Published 2013“…ICA algorithm does vast computations thus; ICA algorithm is used to improve segmentation performance. …”
Get full text
Get full text
Final Year Project -
12
Cryptanalytic attacks on Rivest, Shamir, and Adleman (RSA) cryptosystem: issues and challenges
Published 2014“…Generally RSA algorithm gain a security support because of it’s frequently use in most applications where security of digital data is mostly a concern. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
-
14
-
15
Fingerprint verification using clonal selection algorithm / Farah Syadiyah Shamsudin
Published 2017“…There will be two processes involved, which are feature extraction using minutiae-based method and also the implementation of the proposed algorithm, CSA. …”
Get full text
Get full text
Thesis -
16
Peramalan Isyarat Satelit Menggunakan Kaedah Rangkaian Neural
Published 2006Get full text
Get full text
Monograph -
17
Wind farm reactive power optimization by using imperialist competitive algorithm
Published 2013“…In this paper, the reactive power consumption of a wind turbine is optimized by using (ICA) method. To illustrate the application of the method, a wind farm with some uncertainties is provided. …”
Get full text
Get full text
Conference or Workshop Item -
18
A block-based multi-scale background extraction algorithm
Published 2010“…Conclusion: Using Multi scaling filtering and applying the filters just to some selected nonoverlapped blocks reduce the time consumption of the extracting background algorithm. …”
Get full text
Get full text
Article -
19
Test Data Generation for Event Driven System Using Bees Algorithm
Published 2013Get full text
Get full text
Conference or Workshop Item -
20
Wind Farm Reactive Power Optimization by Using Imperialist Competitive Algorithm
Published 2013“…In this paper, the reactive power consumption of a wind turbine is optimized by using (ICA) method. To illustrate the application of the method, a wind farm with some uncertainties is provided. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
