Search Results - (( java implementation acs algorithm ) OR ( using computing knowing algorithm ))
Search alternatives:
- java implementation »
- implementation acs »
- computing knowing »
- knowing algorithm »
- using computing »
- acs algorithm »
-
1
A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC)
Published 1999Get full text
Get full text
Get full text
Proceeding Paper -
2
Signal detection algorithm for cognitive radio using singular value decomposition
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Simulation algorithm of bayesian approach for choice-conjoint model
Published 2011“…Therefore this research propose simulation algorithm of Bayesian approach for estimating parameter in MPM by Bayesian analysis to avoid computational difficulties in computing the maximum likelihood estimates (MLE).…”
Get full text
Thesis -
4
-
5
The online mastermind game / Cheong Kuen Leion
Published 2003“…Besides that, the player can even know and practice how the computer system is going to solve the puzzles by using the genetic algorithm by showing some hint to the player during the game. …”
Get full text
Get full text
Thesis -
6
-
7
-
8
-
9
-
10
How are exponents used in real-world situations? / Nurul Aityqah Yaacob
Published 2023“…You also need to understand the logic behind algorithms and the order of the number system. Students typically multiply the base by the exponent, for instance, while computing the numerical value of an exponential equation. …”
Get full text
Get full text
Monograph -
11
Computer vision for zoo animals using YOLO algorithm / Muaz Wazir
Published 2022Get full text
Get full text
Thesis -
12
-
13
An Analysis of Node/Peer Discovery Approach and Routing Algorithms in Mobile & Traditional Peer-to-Peer Networks
Published 2012“…The study also showed another differences and similarities in the aspect of routing algorithms. This thesis hopes to offer all necessary useful tips of the divergence on these two aspects and thus to make a contribution allowing researchers to know such divergence.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
-
15
-
16
Scan Matching and KNN Classification for Mobile Robot Localisation Algorithm
Published 2017“…As conclusion, the simple flow of the algorithm is suitable to replace the complex and high computational algorithm and system.…”
Get full text
Get full text
Conference or Workshop Item -
17
-
18
-
19
Data mining in network traffic using fuzzy clustering
Published 2003Get full text
Get full text
Thesis -
20
SVD-based signal detector for cognitive radio networks
Published 2011“…This paper examines the implementation of the Singular Value Decomposition (SVD) method to detect the presence of wireless signal.The method is used to find the maximum and minimum eigenvalues.We simulated the algorithm using common digital signal in wireless communication namely rectangular pulse shape, raised cosine and root-raised cosine to test the performance of the signal detector.The SVD-based signal detector was found to be more efficient in sensing signal without knowing the properties of the transmitted signal.The execution time is acceptable compared to the favorable energy detection.The computational complexity of SVD-based detector is medium compared to the energy detector.The algorithm is suitable for blind spectrum sensing where the properties of the signal to be detected are unknown. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
