Search Results - (( web implications _ algorithm ) OR ( some application ((need algorithm) OR (new algorithm)) ))
Search alternatives:
- web implications »
- some application »
- need algorithm »
- new algorithm »
-
1
A Method for Mapping XML DTD to Relational Schemas In The Presence Of Functional Dependencies
Published 2008“…To approach the mapping problem, three different components are explored: the mapping algorithm, functional dependency for XML, and implication process. …”
Get full text
Get full text
Thesis -
2
HISEC: a new lightweight block cipher algorithm
Published 2014“…Lightweight block cipher algorithms are vital for constrained environment. There are many applications need secured lightweight block cipher algorithm like credit card, E-passport and etc. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
An Efficient Computational Algorithm for Solving Arbitrary Sylvester Matrix Equations in Fuzzy Control Theory (S/O 14179)
Published 2021“…With that, the constructed algorithm is considered as a new contribution to the application of control system theory…”
Get full text
Get full text
Monograph -
4
-
5
Cryptography: A New Approach of Classical Hill Cipher
Published 2013Get full text
Get full text
Article -
6
Iterative methods for solving split common fixed point problems in Hilbert spaces
Published 2016“…Our interest here is to apply these mappings to propose some algorithms for solving split common fixed point problems and its variant forms, in the end, we prove the convergence results of these algorithms. …”
Get full text
Get full text
Get full text
Thesis -
7
Performance evaluation of PID controller optimisation for wheel mobile robot using Bat based optimisation algorithm
Published 2022“…In this study, a new proposed hybrid optimization algorithm, called Extended Bat Algorithm (EBA) is used for optimizing the PID controller for the wheel mobile robot. …”
Get full text
Get full text
Book Chapter -
8
Weed recognition based on erosion and dilation segmentation algorithm
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…The proposed solution was implemented and tested and the results showed that the required time for the security processes is minimized compared to some known algorithms such as AES_Rijndael algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Fsm-Based Enhanced March C- Algorithm For Memory Built-In Self-Test
Published 2017Get full text
Get full text
Thesis -
12
-
13
Efficient prime-based method for interactive mining of frequent patterns.
Published 2011“…This is because the appropriate value depends on the type of application and expectation of the user. Moreover, in some real-time applications such as web mining and e-business, finding new correlations between patterns by changing the minimum support threshold is needed. …”
Get full text
Get full text
Article -
14
-
15
-
16
Identification of non-linear dynamic systems using fuzzy system with constrained membership functions
Published 2004“…Main research directions in this field include the complexity reduction of fuzzy models models, structure identification of fuzzy system, and application of new or improved training algorithms. …”
Get full text
Get full text
Get full text
Thesis -
17
Multi agent quality of service routing based on scheme ant colony optimization algorithm
Published 2014“…Moreover, the proposed approach outperforms the WSP and SWP algorithms, where network efficiency in saturated load gains an 8.39% improvement while the satisfaction of delay and jitter constraints for time critical applications are also achieved. …”
Get full text
Get full text
Thesis -
18
-
19
An approximation approach for free space wave propagation
Published 2009“…In this paper, we propose a new algorithm with high order characteristic. The efficiency of the new algorithm is tested and compared with the efficiency of high order FDTD method by some numerical experiment. …”
Get full text
Get full text
Conference or Workshop Item -
20
