Search Results - (( developing selection method algorithm ) OR ( code application using algorithm ))
Search alternatives:
- developing selection »
- selection method »
- method algorithm »
- code application »
- using algorithm »
-
1
New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique
Published 2016“…These 6 algorithms are divided into 3 main methods namely Method A, Method B, and Method C depending on their search patterns and strategies. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Development of low power viterbi decoder on complex programmable logic device platform
Published 2018“…For the path metric updater unit (PMU), the traditional method of Viterbi algorithm is to store the selected minimum value of branch metric in the memory unit. …”
Get full text
Get full text
Get full text
Thesis -
3
Performance Analysis of Hexagon-Diamond Search Algorithm for Motion Estimation using MATLAB
Published 2010“…Simulation results demonstrate that HDS algorithm has speed up other algorithm’s computational work up to 56% while at the same time maintains close performance in terms of PSNR to others. …”
Get full text
Get full text
Article -
4
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
Get full text
Get full text
Thesis -
5
Performance analysis of hexagon-diamond search algorithm for motion estimation
Published 2010“…Simulation results demonstrate that HDS algorithm has speed up other algorithm’s computational work up to 56% on average while at the same time maintains close performance in terms of average PSNR to others. …”
Get full text
Get full text
Conference or Workshop Item -
6
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
7
Depth linear discrimination-oriented feature selection method based on adaptive sine cosine algorithm for software defect prediction
Published 2024“…To address these challenges, this research introduces a novel Depth Linear Discrimination-Oriented Feature Selection Method based on Adaptive Sine Cosine Algorithm, named Depth Adaptive Sine Cosine Feature Selection (DASC-FS). …”
Get full text
Get full text
Get full text
Article -
8
Improving hand written digit recognition using hybrid feature selection algorithm
Published 2022“…As a result, four significant features were shortlisted to achieve the highest accuracy which was 100.00% by using the proposed hybrid method. Apart from that, the proposed hybrid method was capable of selecting the highest test accuracy of 99.2% when only one feature was included. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Optimized differential evolution algorithm for linear frequency modulation radar signal denoising
Published 2013“…The main contention of this thesis is to investigate the development of new optimization technique based on Differential Evolution algorithm (DE), applied for radar signal denoising application. …”
Get full text
Get full text
Thesis -
10
A genetic algorithm to minimise the maximum lateness on a single machine family scheduling problem
Published 2009“…All algorithms are coded in ANSI-C using Microsoft Visual C++ 6.0 as the compiler, and run on a Pentium 4, 2.0 GHz computer with 2.0 GB RAM. …”
Get full text
Conference or Workshop Item -
11
Harmony search-based robust optimal controller with prior defined structure
Published 2013“…The second level compnses of two HS optimization algorithms developed and coded for robust stability examinations. …”
Get full text
Get full text
Thesis -
12
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
New methods of partial transmit sequence for reducing the high peak-to-average-power ratio with low complexity in the ofdm and f-ofdm systems
Published 2019“…Secondly, two novel algorithms, Grouping Complex iterations algorithm (G-C-PTS), and Gray Code Phase Factor algorithm (Gray-PF-PTS) have been developed to reduce the computational complexity for finding the optimum phase rotation factors in the time domain part of the PTS structure. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
A single measurement of combined Direct and indirect MPPT algorithm for mismatch PV module application / Mohd Najib Mohd Hussain
Published 2016“…The use of module integrated converter (MIC) topologies for photovoltaic (PV) system is to harvest the maximum power point of PV module from solar irradiance. MIC is a promising method to keep the electrical power output from PV module at maximum capacity through maximum power point tracking (MPPT) algorithm during full-sun and mismatch module occurrence. …”
Get full text
Get full text
Thesis -
15
Development of new code for optical code division multiple access systems
Published 2011“…Splitting algorithm is proposed to construct the new code families namely RD code. …”
Get full text
Thesis -
16
Finite Element Modeling Of Ballistic Penetration into Fabric Armor
Published 2006Get full text
Get full text
Thesis -
17
Flowfield-dependent variation method for moving-boundary problems
Published 2015“…A novel numerical scheme using the combination of flowfield-dependent variation method and arbitrary Lagrangian–Eulerian method is developed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
18
A Review on feature selection and ensemble techniques for intrusion detection system
Published 2021“…The design of such a system relies on the detection methods used, particularly the feature selection techniques and machine learning algorithms used. …”
Get full text
Get full text
Article -
19
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We extracted 30 different features from network traffic. We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
20
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article
