Search Results - (( evolution optimization bat algorithm ) OR ( using same based algorithm ))

Refine Results
  1. 1

    Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff by Mohd Yusoff, Nurulanis

    Published 2017
    “…The proposed algorithm is compared against other scheduling algorithms, namely, the Channel and QoS Aware (CQA), Priority Set Scheduler (PSS), Proportional Fair (PF), Maximum Throughput (MT) and Blind Average Throughput (BAT). …”
    Get full text
    Get full text
    Thesis
  2. 2

    Multi-Swarm bat algorithm by Taha A.M., Chen S.-D., Mustapha A.

    Published 2023
    “…In this study a new Bat Algorithm (BA) based on multi-swarm technique called the Multi-Swarm Bat Algorithm (MSBA) is proposed to address the problem of premature convergence phenomenon. …”
    Article
  3. 3

    JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation by Abu, Ahmad Zaidee

    Published 2008
    “…The proposed approach uses a frequency domain combinational framework of coefficients scrambling with Key Scheduling Algorithm based (KSA-based) permutation. …”
    Get full text
    Get full text
    Thesis
  4. 4

    USING LATENT SEMANTIC INDEXING FOR DOCUMENT CLUSTERING by MUFLIKHAH, LAILIL

    Published 2010
    “…Document clustering is an implementation of data mining task. By using similarity measurement of documents‟ characteristic, they can be clustered based on the same category or topic. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Incorporating stemming algorithm in the Malay information retrieval that employs Thesaurus aproach / Mohd Rosmadi Mokhtar by Mokhtar, Mohd Rosmadi

    Published 2001
    “…One of well-known conflation methods is stemming algorithms, where it is used to identify morphological variants. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Energy-efficient two-stage chain protocol routing algorithm for wireless sensor networks by Farhan, Husam Kareem

    Published 2014
    “…The new TSCP routing algorithm is compared with other similar grid-based routing algorithms namely Chain-Cluster based Mixed routing (CCM) and Chain-Chain Based Routing Protocol (CCBRP). …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Noise Cancellation using Selectable Adaptive Algorithm for Speech in Variable Noise Environment by Roshahliza, M. Ramli, Noor, Ali O. Abid, Salina, Abdul Samad

    Published 2017
    “…Some of the teething problems associated in the use of two-sensor noise cancellation systems are the nature of the noise signals—a problem that imposes the use of highly complex algorithms in reducing the noise. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm by Nikfal, Shima

    Published 2007
    “…Then the algorithm gathers all the test cases based on the definition occurrence and def-use pair if they cover same definition occurrence of one variable but they don’t cover def-use pair of the same variable. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Design of low order quantitative feedback theory and H-infinity-based controllers using particle swarm optimisation for a pneumatic actuator system by Ali, Hazem I.

    Published 2010
    “…The second one is a wide range variation when the load mass M=0.1 to 100 kg which is required for the pneumatic servo actuators when they are used in missiles applications. PSO based QFT control algorithm is proposed for pneumatic servo actuator system. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Harmony Search-Based Fuzzy Clustering Algorithms For Image Segmentation by Alia, Osama Moh’d Radi

    Published 2011
    “…This thesis aims to solve these problems using an efficient metaheuristic algorithm, known as the Harmony Search (HS) algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Time normalization of LPC feature using warping method by Sudirman, Rubita, Salleh, Sh. Hussain, Khalid, Puspa Inayat, Ahmad, Abd. Hamid

    Published 2005
    “…The processed features are pitch and Linear Predictive Coefficients (LPC) for input and reference templates, based on Dynamic Time Warping (DTW) algorithm. The first task is to extract pitch features using Pitch Scale Harmonic Filter (PSHF) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2015
    “…And even though several of the code based addresses procedural programs. Some researchers addressed the issue of test case prioritization using Genetic Algorithm, but the authors do not select modification-revealing before prioritization and used the same fault severity. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Multi-base number representation in application to scalar multiplication and pairing computation by Mohammed Ismail, Abdelwahed

    Published 2011
    “…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Data depublication using : Hashing algorithm / Naimah Nayan by Nayan, Naimah

    Published 2019
    “…The hash value is generated by using hashing algorithm such as Message Digest 5 (MD5) and Secure Hashing Algorithm 1 (SHA-1). …”
    Get full text
    Get full text
    Thesis
  16. 16

    A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network by Mohammad Azmi Ridwan, Dr.

    Published 2023
    “…This thesis proposes a hybrid ML-based intrusion detection system (ML-IDS) and ML-based intelligent routing algorithm (ML-RA) for MPLS network. …”
    text::Thesis
  17. 17

    Computation of cryptosystem based on Lucas functions using addition chain by Md Ali, Zulkarnain, Othman, Mohamed, Md. Said, Mohamad Rushdan, Sulaiman, Md. Nasir

    Published 2010
    “…It is based on Addition Chain. The computation time for existing and new algorithms will be recorded. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…This is due to two main reasons: i) this algorithm uses the same modulo value for every E-mail. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Image Processing Of Digital Mammograms For Breast Cancer Detection And Classification by Mohd Nizom, Ahmad Nabil

    Published 2018
    “…The algorithm may be developed for application in other field that uses greyscale image as well.…”
    Get full text
    Get full text
    Monograph
  20. 20

    Identifying the definite base of COI for extraction of DNA sequences using LPBS by Syed Abdullah, Sharifah Lailee, Harun, Hazaruddin, Mohd Hussin, Naimah, Hamid, Jiwa Noris, Mohamed Hanaphi, Roziana

    Published 2012
    “…This paper presents the use of the `Linear-PSO with Binary Search' (LPBS) algorithm for discovering motifs, especially species-specific motifs.In this study, two samples from different fragments of `mitochondrial cytochrome C oxidase subunit I' (COI/COX1) were collected from the Genbank online database.DNA sequences for the first sample are a mix of different fragments of COI and the second sample is from the same fragment of COI.The genome of COI was used as a reference set and other DNA sequences were used as a comparison set.All the collected DNA sequences are from the same species.The results show that the LPBS algorithm is able to discover motifs of greater length when using DNA sequences from the same fragment of COI.The experiment also found that 139 can be used as a starting base for COI DNA sequences extraction to discover species-specific motifs.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item