Search Results - (( based cp based algorithm ) OR ( java application optimization algorithm ))

Refine Results
  1. 1

    Effectiveness of Nature-Inspired Algorithms using ANFIS for Blade Design Optimization and Wind Turbine Efficiency by Sarkar, Md Rasel, Julai, Sabariah, Chong, Wen Tong, Toha, Siti Fauziah

    Published 2019
    “…The performance of these three algorithms in obtaining the optimal blade design based on the Cp are investigated and compared. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Simulation of models and BER performances of DWT-OFDM versus FFT-OFDM by Abdullah, Khaizuran, Hussain, Zahir M.

    Published 2011
    “…By using the transform, the spectral containment of the channels is better since they are not using CP. The wavelet based OFDM (DWT-OFDM) is assumed to have ortho-normal bases properties and satisfy the perfect reconstruction property. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  7. 7

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  8. 8
  9. 9

    Integration Of Fingerprint Centre Point Location And Principal Component Analysis For Fingerprint Verification by Chan, Ying Hui, Abu Bakar, Syed Abdul Rahman

    Published 2005
    “…Principal Component Analysis (Pca) Is Utilized In This System. The Proposed Cp Estimation Algorithm Is Based On The Alteration Tracking (At) Followed By An Estimation Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Cloud Resource Management Framework Using Monarch Butterfly Harmony Search And Case Based Reasoning by Ahmed Mohamed Ghetas, Mohamed Rezk

    Published 2017
    “…A few of existing resource management approaches aim to increase the cloud provider (cp) service provisioning profits. However, they are based on local search optimization algorithms, which may not obtain the best resource provisioning decision in a large-scale cloud environment. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    A digital signature on cubic Pell Cryptosystem CP256-1299 by Abu, Nur Azman, Nitaj, Abderrahmane, Kamel Ariffin, Muhammad Rezal

    Published 2025
    “…We compare our new scheme to three widely-used digital signature algorithms based on ECC, namely ED25519, SECP256K1 and SECP256R1. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Fingerprint center point location using directional field by Chan, Y. H., Syed Abu Bakar, Syed Abdul Rahman

    Published 2004
    “…The proposed algorithm is based on Alteration Tracking (AT) and CP estimation (CPE). …”
    Get full text
    Get full text
    Get full text
    Book Section
  14. 14
  15. 15

    Fault location in unbalanced distribution system including distributed generation units using multi-layer feed forward neural network by Farzan, Payam

    Published 2014
    “…This thesis presents a fault location algorithm based on the recording of Short Circuit Power (S/C.P) and Short Circuit Current (S/C.C) values at the source bus of unbalanced radial simulated distribution networks including DG units. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Protected control packets to prevent denial of services attacks in IEEE 802.11 wireless networks by Malekzadeh, Mina, Abdul Ghani, Abdul Azim, K. Subramaniam, Shamala

    Published 2011
    “…The first model is based on original HMAC-SHA1 algorithm and the second one is based on a proposed modified HMAC-SHA1 (M-hmac) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19
  20. 20