Search Results - (( java implication based algorithm ) OR ( ((using function) OR (using factor)) method algorithm ))

Refine Results
  1. 1

    A study on regional GDP forecasting analysis based on radial basis function neural network with genetic algorithm (RBFNN-GA) for Shandong economy by Qing, Zhang, Abdullah, Abdul Rashid, Choo, Wei Chong, Ali, Mass Hareeza

    Published 2022
    “…This stochastic learning method is a useful addition to the existing methods for determining the center and smoothing factors of radial basis function neural networks, and it can also help the network more efficiently train. …”
    Get full text
    Get full text
    Article
  2. 2

    Firefly analytical hierarchy algorithm for optimal allocation and sizing of distributed generation in radial distribution network by Bujal, Noor Ropidah

    Published 2022
    “…As for multi-objective functions associated with the optimisation problem, a weight-sum method is typically used to determine each objective function's coefficient factors (CF). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    FPGA-based Implementation of SHA-256 with Improvement of Throughput using Unfolding Transformation by Shamsiah, Suhaili, Norhuzaimin, Julai

    Published 2022
    “…The SHA-256 hash function factor four hardware implementation was successfully tested using the Altera DE2-115 FPGA board. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    High-Throughput of SHA-256 Hash Function with Unfolding Transformation by Shamsiah, Binti Suhaili, Watanabe, Takahiro

    Published 2019
    “…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
    Get full text
    Get full text
    Proceeding
  5. 5

    High-Throughput of SHA-256 Hash Function with Unfolding Transformation by Shamsiah, Binti Suhaili, Watanabe, Takahiro

    Published 2019
    “…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
    Get full text
    Get full text
    Proceeding
  6. 6
  7. 7

    High-Throughput of SHA-256 Hash Function with Unfolding Transformation by Shamsiah, Suhaili, Watanabe, Takahiro

    Published 2019
    “…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    High-Throughput of SHA-256 Hash Function with Unfolding Transformation by Shamsiah, Suhaili, Watanabe, Takahiro

    Published 2019
    “…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Self-adaptive conjugate method for a robust and efficient performance measure approach for reliability-based design optimization by Keshtegar, Behrooz, Baharom, Shahrizan, El-Shafie, Ahmed

    Published 2018
    “…With this aim, the conjugate search direction is adaptively computed using the mean value of the previous performance function with a limited conjugate scalar factor. …”
    Get full text
    Get full text
    Article
  10. 10

    Design Methodology and Analysis of Hash Function based-on Field Programmable Gate Array for Hash-based Message Authentication Code Application by SHAMSIAH BINTI, SUHAILI

    Published 2025
    “…The main objective of this research is to formulate unfolding transformation factor 2 and factor 4 methods into hash function design. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Optimization Of Pid Controller Using Grey Wolf Optimzer And Dragonfly Algorithm by Nik Mohamed Hazli, Nik Muhammad Aiman

    Published 2018
    “…In this research, swarming intelligence is used to solve optimisation problem. Grey Wolf Optimizer and Dragonfly Algorithm were chosen. …”
    Get full text
    Get full text
    Monograph
  12. 12

    Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed by Borujeni, Sattar Chavoshi

    Published 2012
    “…Factor analysis using principle component analysis (PCA) with an orthogonal rotation method, varimax factor rotation have resulted in 4 out of 15 parameters namely area, mean elevation, Gravelius factor and shape factor. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Selection of access network using cost function method in heterogeneous wireless network by Mohamad Tahir, Hatim, Al-Ghushami, Abdullah Hussein, Yahya, Zainor Ridzuan

    Published 2014
    “…This method covers the weight distribution and cost factor techniques.The weight distribution is used to measure different weights for existing wireless network based on the user's preference and mobile terminal power.The cost factor technique is also used to identify the cost for performing handover target by considering every network parameters and its weight.Results obtained showed that the algorithm has the ability to increase user's satisfaction compared to other algorithms, which consistently choose one accessible network.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Optimal sizing of hybrid tidal, photovoltaic and battery sources of energy by Sadeghi, Omid Sarrafan

    Published 2015
    “…In the proposed method sequential Monte Carlo method is used to consider the uncertainty in renewable sources. …”
    Get full text
    Get full text
    Thesis
  15. 15

    An effective 4–phased framework for scheduling job-shop manufacturing systems using weighted NSGA-II by Delgoshaei, Aidin, Mohd Ariffin, Mohd Khairol Anuar, Leman, Zulkiflle

    Published 2022
    “…The outcomes indicated that using the proposed method for the studied cases saved up to 5% in the objective function for small-scale, 11.2% for medium-scale, and 3.8% for large-scale manufacturing systems. …”
    Get full text
    Get full text
    Article
  16. 16

    Nlfxlms and thf-nlfxlms algorithms for wiener-hammerstein nonlinear active noise control by Srazhidinov, Radik

    Published 2016
    “…In recent works, it was shown that the SEF can be approximated using tangential hyperbolic function (THF) for Hammerstein and Wiener NLFXLMS algorithms, such that the degree of nonlinearity can be estimated using modelling approach. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Evaluation of lightning return stroke current using measured electromagnetic fields by Mahdi, Izadi

    Published 2012
    “…Moreover, in the proposed method, the attenuation height dependent factor can be determined using measured field while assuming it to be an unknown function based on the engineering model. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Effect of fitness function on localization performance in range-free localization algorithm by Han, Fengrong, Izzeldin Ibrahim, Mohamed Abdelaziz, Kamarul Hawari, Ghazali, Zhao, Yue

    Published 2024
    “…However, so far there is no literature to investigate the effect of fitness function on rang-free localization algorithm. Firstly, this study comprehensively reviews and classifies the frequently-used localization fitness function in range-free localization scheme. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20