Search Results - (( basic information modified algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1
  2. 2
  3. 3

    Fuzzy algorithm for 3D coastal gemorphology mapping by DInSAR by Marghany, Maged, Hashim, Mazlan

    Published 2007
    “…The basic concept of fuzzy algorithm was used to filter DInSAR data. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Improved Multi-Verse Optimizer In Text Document Clustering For Topic Extraction by Abasi, Ammar Kamal Mousa

    Published 2021
    “…Second, three multi-verse optimizer algorithm (MVOs), namely, basic MVO, modified MVO, hybrid MVO is proposed to solve the TDC problem; these algorithms are incremental improvements of the preceding versions. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Convergence of interval symmetric single-step method for simultaneous inclusion of real polynomial zeros by Salim, Nur Raidah

    Published 2012
    “…The processing time (CPU) of the algorithm of the modified methods may be done using Matlab 2007a associated with Intlab. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…The gain and the Jacobian matrices associated with the basic algorithm require large storage and have to be evaluated at every iteration, resulting in more computation time. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…Problem statement: The executable files are one of the most important files in operating systems and in most systems designed by developers (programmers/software engineers), and then hiding information in these file is the basic goal for this study, because most users of any system cannot alter or modify the content of these files. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Digital forensic investigation reduction model (DIFReM) for Windows 10 OS by Shayau, Yazid Haruna

    Published 2018
    “…An algorithm was used to verify filetypes by looking up a File Signature library to compare files’ header with their extension. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Implementation of MRAC, SVMPC and PID control based on direct digital control application for dc servomotor by Mohamad Saleh, Saleha

    Published 2005
    “…The computer is connected to MS150 Modular Servo System via AX5412 data acquisition card and Microsoft Visual Basic 6.0 is used to conduct the experiment. Field-testing is implemented to compare the results between the original and modified system within three types of controller. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Image watermarking optimization algorithms in transform domains and feature regions by Tao, Hai

    Published 2012
    “…The achieved tradeoffs from these techniques between imperceptibility and robustness are controversial.To solve this problem,this study proposes the application of artificial intelligent techniques into digital watermarking by using discrete wavelet transform (DWT) and singular value decomposition (SVD).To protect the copyright information of digital images,the original image is decomposed according to two-dimensional discrete wavelet transform.Subsequently the preprocessed watermark with an affined scrambling transform is embedded into the vertical subband (HLm) coefficients in wavelet domain without compromising the quality of the image.The scaling factors are trained with the assistance of Particle Swarm Optimization (PSO).A new algorithmic framework is used to forecast feasibility of hypothesized watermarked images.In addition,the novelty is to associate the Hybrid Particle Swarm Optimization (HPSO),instead of a single optimization,as a model with SVD.To embed and extract the watermark,the singular values of the blocked host image are modified according to the watermark and scaling factors. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Robust Kernel Density Function Estimation by Dadkhah, Kourosh

    Published 2010
    “…The efficiency of the modified mutual information estimate is evaluated based on its accuracy. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Recovery of tree community composition across different types of anthropogenic disturbances and characterization of their effect using Landsat time series in Bornean tropical monta... by Keiko Ioki, Daniel James, Phua, Mui How, Satoshi Tsuyuki, Nobuo Imai

    Published 2022
    “…Studies have shown that the wide variety of human activities in tropical uplands results in different ecological responses of secondary forests, but basic information on the disturbance impacts and underlying recovery processes is lacking. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article