Search Results - (( parameter evaluation method algorithm ) OR ( using function window algorithm ))

Refine Results
  1. 1

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Second, propose an Optimized Time Sliding Window based Three Colour Marker. Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure by Asbullah, Muhammad Asyraf

    Published 2015
    “…Moreover, for the purpose of empirical evidences, some parameters are chosen in the course of the process to validate the efficiency in terms of algorithmic running time and memory consumptions. …”
    Get full text
    Get full text
    Thesis
  3. 3

    EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique by Liew, Siaw Hong

    Published 2016
    “…The IncFRNN algorithm is able to control the size of training pool using predefined window size threshold. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Adaptive array antenna design for wireless communication systems by Nurul Hazlina, Noordin

    Published 2013
    “…In previous single-port beamforming methods, the spatial information of the signals is not fully recovered and this limits the use of conventional adaptive beamforming algorithms. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Sliding Window for Radial Basis Function Neural Network Face Detection by Mohamood, Nadzrie, Hashim, Nik Mohd Zarifie, Aziz, Khairul Azha A

    Published 2014
    “…This paper present a Radial Basis Function Neural Network (RBFNN) face detection using sliding windows. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Ciphercrypt-an Encryption System / Nor Hidayah Ngah by Nor Hidayah, Ngah

    Published 2004
    “…The hashed keyword will be used in encrypt / decrypt process by using any of 3 encryption algorithm mentioned before. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Network calculus-based latency for time-triggered traffic under Flexible Window-Overlapping Scheduling (FWOS) in a Time-Sensitive Network (TSN) by Shalghum, Khaled M., Noordin, Nor Kamariah, Sali, Aduwati, Hashim, Fazirulhisyam

    Published 2021
    “…Accordingly, more relaxed scheduling algorithms are required. In this paper, we introduce the flexible window-overlapping scheduling (FWOS) algorithm that optimizes the overlapping among TT windows by three different metrics: the priority of overlapping, the position of overlapping, and the overlapping ratio (OR). …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Taguchi-Grey Relational Analysis Method for Parameter Tuning of Multi-objective Pareto Ant Colony System Algorithm by Muthana, Shatha Abdulhadi, Ku Mahamud, Ku Ruhana

    Published 2023
    “…The gray relational grade (GRG) performance metric and the Friedman test were used to evaluate the algorithm’s performance. The Taguchi-GRA method that produced the new values for the algorithm’s parameters was shown to be able to provide a better multi-objective generator maintenance scheduling (GMS) solution. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Evaluation of lightning current parameters using measured lightning induced voltage on distribution power lines by Izadi, Mahdi, Ab Kadir, Mohd Zainal Abidin, Osman, Miszaina

    Published 2019
    “…In this paper, an algorithm had been proposed to evaluate the lightning current parameters using measured voltage from overhead distribution lines based on lightning location obtained from lightning location system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study by Li Yu Yab, Li Yu Yab, Wahid, Noorhaniza, A Hamid, Rahayu

    Published 2023
    “…This comparative study aims to investigate and compare the effectiveness of the inversed control parameter in the proposed methods against the original algorithms in terms of the number of selected features and the classification accuracy. …”
    Get full text
    Get full text
    Article
  13. 13

    Inversed Control Parameter in Whale Optimization Algorithm and Grey Wolf Optimizer for Wrapper-Based Feature Selection: A Comparative Study by Li Yu Yab, Li Yu Yab, Wahid, Noorhaniza, A Hamid, Rahayu

    Published 2023
    “…This comparative study aims to investigate and compare the effectiveness of the inversed control parameter in the proposed methods against the original algorithms in terms of the number of selected features and the classification accuracy. …”
    Get full text
    Get full text
    Article
  14. 14

    Efficient back-off mechanism for multimedia support in IEEE 802.11E by Al-Nuaimi, Aws Ali Shakir

    Published 2012
    “…The main concept of the DFA-EDCA algorithm is to use exponential functions to tune the back-off parameters adaptively according to changes in network load and serve the time-bounded multimedia applications rapidly. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Memristor based ring oscillators true random number generator with different window functions for applications in cryptography by Hashim N.A.N., Loong J.T.H., Ghazali A., Hamid F.A.

    Published 2023
    “…The designs are implemented in 0.18 �m complementary metal oxide semiconductor (CMOS) technology using LT SPICE IV. Different window functions for the memristor model was applied to the TRNG and compared. …”
    Article
  16. 16

    Evaluation of Lightning Current Using Inverse Procedure Algorithm. by Ab Kadir, Mohd Zainal Abidin, Izadi, Mahdi, Askari, Mohamad Tolou, Hajikhani, Maryam

    Published 2013
    “…The proposed method considers on all electromagnetic fields components and can evaluate full shape of current, velocity and constant parameters of current models in contrast with previous studies. …”
    Get full text
    Get full text
    Article
  17. 17

    Efficient hardware design for palm-dorsa vein image enhancement by Jusoh@Yusoff, Suhaimi Bahisham

    Published 2018
    “…The aim of this thesis is to develop hardware design for palm-dorsa vein image enhancement algorithm. The algorithm is designed in hardware using hardware description language for hardware realization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Optimized processing of satellite signal via evolutionary search algorithm by Hassan, Azmi, Othman, Rusli, Tang, Kieh Ming

    Published 2000
    “…Using a different initial point, all of them produced the correct results …”
    Get full text
    Get full text
    Article
  19. 19

    Tree-based contrast subspace mining method by Florence Sia Fui Sze

    Published 2020
    “…Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20