Search Results - (( basic evaluation practices algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1
  2. 2
  3. 3

    Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming by Hussien, Hassan Mansur, Md Yasin, Sharifah, Muda, Zaiton, Udzir, Nur Izura

    Published 2019
    “…In point of fact, it is significant to produce a security evaluation of block cipher algorithms to determine a statistical non-random behavior of attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Syllable-based Malay Word Stemmer by Jun, Choi Lee, Mohamad Othman, Rosita, Mohamad , Nurul Zawiyah

    Published 2014
    “…The approach shows high practicality as it produces a very high accuracy in the evaluation.…”
    Get full text
    Get full text
    Proceeding
  6. 6
  7. 7

    Performance optimization method in OFDM based on majorization and minimization technique by Al-Saadi, Alaa Abdullah, Latip, Rohaya, Muhammed, Abdullah

    Published 2019
    “…In this paper, we demonstrate and simulate a practical algorithm to mitigate phase noise which induces ICI .This algorithm is termed as Tight Quadratic Majorization (TQM) and is derived for phase noise estimation. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation by Chen, Soong Der

    Published 2000
    “…When such a block was detected, some of the standard processing steps may be skipped and some computation may be saved. The proposed new algorithm was evaluated and the results indicate that it was practical in low bit rate environments targeted by H.263 as no negative speed gain was observed for the full range of step size during the evaluation. …”
    Get full text
    Get full text
    Thesis
  9. 9

    An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan by Syed Adnan, Syed Farid

    Published 2019
    “…To date, this research found no known practical implementation of the AAḃ algorithm to prove or to validate its efficiency on a real-world computing platform. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Development an accurate and stable range-free localization scheme for anisotropic wireless sensor networks by Han, Fengrong

    Published 2022
    “…The developed localization framework is separately validated and evaluated each optimized step under various evaluation criteria, in terms of accuracy, stability, and cost, etc. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Automatic generic process migration system in linux by Zarrabi, Amirreza

    Published 2012
    “…A fexible interface to the underlying checkpoint/ restart subsystem is designed which permits users to specify the migration mechanism according to process constraints. A migration algorithm is designed which attempts to exploit the unique features of the basic migration algorithms to form a generic algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Mobile robot positioning system by Khairulnizam Othman

    Published 2008
    “…This component is build with complete circuit interface to a Parallax Basic Stamp (BS2) microcontroller module. Several motion control algorithm using BS2 software was develop to test the capabilities of system mobile motion in Y axis, X axis and other, particular attention is paid to evaluate the ability of the using Odometry to detect and correct positioning of the mobile platforms from 4 point. …”
    Get full text
    Learning Object
  15. 15

    An enhance embedding method using edge and textures detection for image steganography by Al-Maliki, Alaa Jabbar Qasim

    Published 2024
    “…By embedding in noisy zones using edge and texture detection which complicates feature extraction, making hidden information more secure and statistically less detectable than basic LSB matching techniques. The study contributes both theoretically and practically to the field of steganography by developing an innovative algorithm that enhances the security and robustness of image hidden data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Transtheoretical model of change for weight control in Malaysian context by Chang, Ching Thon

    Published 2010
    “…The Stages of Change algorithm was able to classify the respondents into different Stages of Change to lose weight. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Integrated artificial intelligence-based classification approach for prediction of acute coronary syndrome by Salari, Nader

    Published 2014
    “…In the development of the “hybrid AI-based” classification models, the proposed model (K1-K2- NN), was basically introduced through combining AI approaches of modified K-NN, genetic algorithm (GA), Fisher’s discriminant ratio (FDR) and class separability criteria (CSC). …”
    Get full text
    Get full text
    Get full text
    Thesis