Search Results - (( developing effective methods algorithm ) OR ( code application using algorithm ))
Search alternatives:
- methods algorithm »
- code application »
- using algorithm »
-
1
Learning Algorithm effect on Multilayer Feed Forward Artificial Neural Network performance in image coding
Published 2007“…The essence of this study is to investigate the most efficient and effective training methods for use in image compression and its subsequent applications. …”
Get full text
Get full text
Get full text
Article -
2
New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique
Published 2016“…These 6 algorithms are divided into 3 main methods namely Method A, Method B, and Method C depending on their search patterns and strategies. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Discretization of crack propagation on parallel computing : complexity and parallel algorithms with source code
Published 2010“…In this book, the performance measurements of algorithm are presented in terms of speedup, efficiency, effectiveness and temporal performance.…”
Get full text
Get full text
Get full text
Book Section -
4
Discretization of crack propagation on parallel computing: complexity and parallel algorithms with source code
Published 2010“…In this book, the performance measurements of algorithm are presented in terms of speedup, efficiency, effectiveness and temporal performance.…”
Get full text
Get full text
Get full text
Book -
5
General algorithms for 3-D motion of a non-planar body in a steady-state force field
Published 2002“…Herein we compare the two methods in terms of efficiency and accuracy. Due to their general nature, the algorithms may be readily coded to meet the needs of many applications…”
Get full text
Get full text
Article -
6
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
Get full text
Get full text
Thesis -
7
A genetic algorithm to minimise the maximum lateness on a single machine family scheduling problem
Published 2009“…All algorithms are coded in ANSI-C using Microsoft Visual C++ 6.0 as the compiler, and run on a Pentium 4, 2.0 GHz computer with 2.0 GB RAM. …”
Get full text
Conference or Workshop Item -
8
Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems
Published 2018“…The MTS algorithm is coded in ANSI-C language and tested on benchmark data from Mandl's Swiss Network and Mumford's larger data. …”
Get full text
Get full text
Thesis -
9
Harmony search-based robust optimal controller with prior defined structure
Published 2013“…The second level compnses of two HS optimization algorithms developed and coded for robust stability examinations. …”
Get full text
Get full text
Thesis -
10
Direct Block Methods for Solving Special Second Order Ordinary Differential Equations and Their Parallel Implementations
Published 2008“…The parallel codes of the block methods for the solution of large systems of ODEs are developed. …”
Get full text
Get full text
Thesis -
11
Development of new code for optical code division multiple access systems
Published 2011“…Splitting algorithm is proposed to construct the new code families namely RD code. …”
Get full text
Thesis -
12
New methods of partial transmit sequence for reducing the high peak-to-average-power ratio with low complexity in the ofdm and f-ofdm systems
Published 2019“…Secondly, two novel algorithms, Grouping Complex iterations algorithm (G-C-PTS), and Gray Code Phase Factor algorithm (Gray-PF-PTS) have been developed to reduce the computational complexity for finding the optimum phase rotation factors in the time domain part of the PTS structure. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Improving hand written digit recognition using hybrid feature selection algorithm
Published 2022“…Therefore, many researchers have applied and developed various machine learning algorithms that could efficiently tackle the handwritten digit recognition problem. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
Optimal generator matrix G
Published 2013“…Multiple antenna transmission methods are currently being developed all around the world for evolving 3G wireless standards. …”
Get full text
Get full text
Article -
15
A modified technique in RFID networking planning and optimization
Published 2015“…In this research, PSO algorithm was used in the optimization process as it was considered as a very useful, efficient and well known algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Effort Estimation Model for Function Point Measurement
Published 2007“…The process starts with the planning phase activities and refined throughout the development. Various cost estimation models and methods are available to be used for software development process. …”
Get full text
Get full text
Thesis -
17
Thermal Analysis Of The Composite Wall Subjected To Time Dependent Temperature Variation
Published 2004“…Many researches have been carried out in this field in order to develop new methods that will lead to progressions and improvements. …”
Get full text
Get full text
Monograph -
18
Development of finite element model for soil-structure interaction
Published 2014“…In order to evaluate the accuracy of the developed code (2DSSI), a series of examples have been used as benchmarks to verify the analyses. …”
Get full text
Get full text
Thesis -
19
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
20
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
Published 2017“…Furthermore, the system was developed using Fingerprint Matching Algorithm (FMA), Image Processing technique and embedded programming technique. …”
Get full text
Get full text
Thesis
