Search Results - (( parameter equalization based algorithm ) OR ( using function a algorithm ))

Refine Results
  1. 1
  2. 2

    Loop-based RSA Key Generation Algorithm using String Identity by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2013
    “…Previous algorithm was successful used email identity as a public key, but not all type of email can used as a public key. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4
  5. 5

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Second, propose an Optimized Time Sliding Window based Three Colour Marker. Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
    Get full text
    Get full text
    Thesis
  6. 6

    System program management environment in cloud computing using hybrid Genetic Algorithm and Moth Flame Optimization (GA-MFO) by Mohd Erwan Mazalan

    Published 2022
    “…This project present a system program algorithm based on Moth Flame Optimization (MFO) algorithm to assign an optimal set of system program to meet the satisfaction of quality of service requirements of cloud computing in such a way that the total execution time of tasks is minimized. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  7. 7

    Enhancement of Over-Exposed and Under-Exposed Images Using Hybrid Gamma Error Correction Sigmoid Function by Mohd Azau, Mohd Azrin

    Published 2007
    “…This thesis combines the functions' properties and developed a hybrid algorithm to improve the quality of the poorly captured images by adjusting the contrast and compensating the gamma error. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong by Lily , Wong

    Published 2018
    “…The computational results also show that the algorithms of population based ACO performs better than the algorithms of non-population based ACO. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Performance evaluation of Black Hole Algorithm, Gravitational Search Algorithm and Particle Swarm Optimization by Zuwairie, Ibrahim, Mohamad Nizam, Aliman, Fardila, Naim, Sophan Wahyudi, Nawawi, Shahdan, Sudin

    Published 2015
    “…Particle Swarm Optimization (PSO) and Gravitational Search Algorithm are a well known population-based heuristic optimization techniques. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Nomadic people optimizer (NPO) for large-scale optimization problems by Mohamd Salih, Sinan Qahtan

    Published 2019
    “…The NPO was tested and evaluated based on sixty unconstrained benchmark test functions. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Artificial Bee Colony-based satellite image contrast and brightness enhancement technique using DWT-SVD by Bhandari, A.K., Soni, V., Kumar, A., Singh, G.K.

    Published 2014
    “…The proposed technique is based on the Artificial Bee Colony (ABC) algorithm using Discrete Wavelet Transform and Singular Value Decomposition (DWT-SVD). …”
    Get full text
    Get full text
    Article
  12. 12

    Predictive Functional Control With Reduced-Order Observer Design Using Particle Swarm Optimization For Pneumatic System by Abd Rahman, Azira

    Published 2020
    “…PSO is used to tuning the value of parameter time constant in Predictive Functional Control (PFC) to solve the problem for manual tuning. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Improvement of land cover mapping using Sentinel 2 and Landsat 8 imageries via non-parametric classification by Myaser, Jwan

    Published 2020
    “…Nevertheless, AC is not required for LCM if the original multi-spectral image is used. The last phase involves developing a new fusion algorithm using SVM and Fuzzy K-Means Clustering (FKM) algorithms for Sentinel 2 data to enhance LCM accuracy. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Optimal Power Flow of power systems using Harris Hawks Optimization and Salp Swarm Algorithm by Zohrul, Islam Mohammad

    Published 2021
    “…The main objective is to adjust all the controlling parameters by satisfying equality and inequality constraints in order to optimize several objective functions. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Acltshe-Amts: A New Adaptive Brain Tumour Enhancement And Segmentation Approaches by Alkhafaji, Ali Fawzi Mohammed Ali

    Published 2024
    “…Second, the conventional multilevel thresholding approaches, including optimization-based thresholding approaches, have several main issues, such as manual adjustment of multilevel thresholds, dedicating single thresholding criteria as objective functions, leading to the bias of the thresholding towards a specific type of MR image, and the requirement to tune a large number of control parameters. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    The development of Muscle Fatigue Prediction model from muscle torque and contraction data / Keshasni Earichappan by Keshasni , Earichappan

    Published 2023
    “…This study aims to develop a prediction model to predict muscle fatigue levels (100%-75%, 75%-50%, 50%-25%, 25%-0%) from muscle contraction and torque using Levenberg Marquardt algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    An enhanced fuzzy commitment scheme in biometric template protection by Taqiyah Khadijah, Ghazali

    Published 2023
    “…This research has contributed towards the key-binding technique of biometric fingerprint template protection, based on FCS. In particular, this research was designed to create a secret binary feature that can be used in other state-of-the-art cryptographic systems by using an appropriate error-correcting approach that meets security standards.…”
    Get full text
    Get full text
    Get full text
    Thesis