Search Results - (( solution extraction method algorithm ) OR ( problem implementation _ algorithm ))
Search alternatives:
- problem implementation »
- solution extraction »
- extraction method »
- method algorithm »
-
1
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…The decryption process on the other hand is divided into two main stages: key extraction process, and decryption process. The proposed solution was implemented and tested and the results showed that the required time for the security processes is minimized compared to some known algorithms such as AES_Rijndael algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Design and implementation of multimedia digital matrix system
Published 2005“…The hybrid-reset algorithm is successfully solved the most well known problem of channel synchronization in data oversampling method. …”
Get full text
Get full text
Conference or Workshop Item -
3
-
4
Hysteresis Modelling of Pneumatic Artificial Muscle using General Cubic Equation and Factor Theorem Prediction Method / Mohd Azuwan Mat Dzahir...[et al.]
Published 2017“…However, implementing a complicated control algorithm does not always indicate the best solution that could be used to control the pneumatic artificial muscles. …”
Get full text
Get full text
Article -
5
-
6
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
Published 2017“…Related work was surveyed in digital watermarking, cryptography and design methodology before implementing the text based watermarking method (embedded and extract/detection of watermarks).The implementation results on text based digital watermarking combined with cryptographic techniques are presented. …”
Get full text
Get full text
Get full text
Thesis -
7
Analyzing customer reviews for ARBA Travel using sentiment analysis
Published 2025Get full text
Get full text
Student Project -
8
Using genetic algorithms to optimise land use suitability
Published 2012“…In this study, under environmentfriendliness objective, based on multi-agent genetic algorithms, was developed a geospatial model for the land use allocation. …”
Get full text
Get full text
Thesis -
9
EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique
Published 2016“…Thus, this research aims to design an Incremental FRNN (IncFRNN) technique for person authentication modelling using feature extracted EEG signals from VEP electrodes. The IncFRNN algorithm updates the training set by employing a heuristic update method to maintain representative objects and eliminate rarely used objects. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
Perturbation stochastic model updating of a bolted structure / Mohamad Azam Shah Aziz Shah
Published 2022“…However, the presence of high-dimensional uncertainty of the structural problem, such as a bolted structure, makes it difficult for the SMU method to provide an accurate prediction result, which usually leads to large errors, hard convergence and ill-condition problems. …”
Get full text
Get full text
Thesis -
12
Identifying Features Eligiblity For Blood Donors' Preferences Using Artificial Neural Networks Prediction Performances
Published 2017“…These findings of this study contribute as beneficial information to improve blood donation or healthcare service, as guide to collect and arrange data into prediction or another data mining problems, and extend another study for flexible algorithms with various datasets.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Fused multivariate empirical mode decomposition (MEMD) and inverse solution method for EEG source localization
Published 2018“…We also developed an unsupervised algorithm utilizing a wavelet method to remove eye blink artifacts. …”
Get full text
Get full text
Article -
14
Fused multivariate empirical mode decomposition (MEMD) and inverse solution method for EEG source localization
Published 2018“…We also developed an unsupervised algorithm utilizing a wavelet method to remove eye blink artifacts. …”
Get full text
Get full text
Get full text
Article -
15
EEG-and MRI-based epilepsy source localization using multivariate empirical mode decomposition and inverse solution method
Published 2018“…Therefore, in this study a coupled Multivariate Empirical Mode Decomposition (MEMD) with embedded automated artifact remover algorithm and inverse solution method is proposed. …”
Get full text
Get full text
Thesis -
16
Arabic Text Clustering Methods And Suggested Solutions For Theme-based Quran Clustering: Analysis Of Literature
Published 2024journal::journal article -
17
Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking
Published 2012“…The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. The solution consists of an algorithm for automatic collection of candidate seed points using efficient grid line searching mechanism and a validation method which uses local geometric and intensity based features as effective validation rules to discriminate between the actual seed point and false alarms. …”
Get full text
Get full text
Thesis -
18
Cuckoo search algorithm and wind driven optimization based study of satellite image segmentation for multilevel thresholding using Kapur’s entropy
Published 2014“…This algorithm is used to obtain the best solution or best fitness value from the initial random threshold values, and to evaluate the quality of a solution, correlation function is used. …”
Get full text
Get full text
Article -
19
Automatic selection of initial points for exploratory vessel tracing in fluoroscopic images
Published 2011“…Among a considerable number of methods, direct exploratory tracing method is known to be an efficient solution for reliable extraction of vessel features from two-dimensional fluoroscopic images. …”
Get full text
Get full text
Get full text
Article -
20
A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat
Published 2021“…Readability was detected using a free online optical character recognition application called Aeosoft. Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
Get full text
Get full text
Thesis
