Search Results - (( java implementation amh algorithm ) OR ( basic same based algorithm ))

Refine Results
  1. 1

    JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation by Abu, Ahmad Zaidee

    Published 2008
    “…The proposed approach uses a frequency domain combinational framework of coefficients scrambling with Key Scheduling Algorithm based (KSA-based) permutation. This novel algorithm applies coefficients scrambling using Combined-Reverse-and-Normal-Direction (CRND) scanning together with Distorted DC permutation (DDP). …”
    Get full text
    Get full text
    Thesis
  2. 2

    Data depublication using : Hashing algorithm / Naimah Nayan by Nayan, Naimah

    Published 2019
    “…To eliminated the duplicate data, the file unique value or hash value need to compare and the files that have the same hash value will be remove. This method basically will help to improve the storage capacity and efficiency. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A comparative analysis of image copy-move forgery detection algorithms based on hand and machine-crafted features by Ahmed I.T., Hammad B.T., Jamil N.

    Published 2023
    “…However, these surveys are not covered for both IC-MFD algorithms based hand-crafted features and IC-MFDs algorithms based machine-crafted features. …”
    Article
  4. 4
  5. 5

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9

    Tackling the berth allocation problem via harmony search algorithm by Ahmed, Bilal, Hamdan, Hazlina, Muhammed, Abdullah, Husin, Nor Azura

    Published 2024
    “…Harmony Search Algorithm (HSA) is one of the recent population-based optimization methods which inspired by modern-nature. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Cyclic Path Planning Of Hyper-Redundant Manipulator Using Whale Optimization Algorithm by Machmudah, Affiani, Parman, Setyamartana, Abbasi, Aijaz, Solihin, Mahmud Iwan, Abd Manan, Teh Sabariah, Beddu, Salmia, Ahmad, Amiruddin, Wan Rasdi, Nadiah

    Published 2021
    “…The basic idea is based on a geometrical analysis of a 3-link planar series manipulator in which there is an orientation angle boundary of a prescribed path. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Quality of service and energy efficient aware (QEEA) scheduling algorithm for long term evolution (LTE) network / Nurulanis Mohd Yusoff by Mohd Yusoff, Nurulanis

    Published 2017
    “…Basically, the QEEA is based on the Time Domain (TD) and Frequency Domain (FD) scheduling where it is dependent on the QoS requirements to allocate resources. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Retrieval based on skin color to detect the malicious images by Nooralisa Mohd Tuah, Nuraini Jamil, Dg. Senandong Ajor

    Published 2009
    “…Digital image processing algorithms should extract all the relevant features from the image in the same way a human would do. …”
    Get full text
    Get full text
    Get full text
    Research Report
  16. 16
  17. 17

    Genetic algorithm optimization of product design for environmental impact reduction / Julirose Gonzales by Julirose , Gonzales

    Published 2018
    “…A novel feature-based product design methodology based on an integrated CAD-LCA approach is developed which analyzes a product design’s environmental impact. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Integration of enchanced jump point search (JPS) algorithm with modified bresenham technique for path planning in virtual grid-based environment by Nurul Atikah Janis

    Published 2018
    “…We demonstrate our framework; the integration of enhanced Jump Point Search algorithm with modified Bresenham for heuristic computation in virtual grid-based environment. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Avoiding under-reaching in twin circuit lines without residual current input from the parallel line by Mukerjee R.N., Bin Abdullah M.F., Tan K.K., Nallagownden P.

    Published 2023
    “…The paper develops characteristic expressions for the effective sequence impedances experienced by a twin-circuit, both with and without mutual coupling and presents a non-iterative microprocessor based real time algorithm for computing fault distance and zero sequence compensation in basic distance relaying scheme, Residual current measurement from the parallel circuit is not required in the algorithm. � 2007 RPS.…”
    Conference Paper