Search Results - (( solution extraction method algorithm ) OR ( problem implementation using algorithm ))
Search alternatives:
- problem implementation »
- implementation using »
- solution extraction »
- extraction method »
- method algorithm »
- using algorithm »
-
1
New Cryptographic Algorithms for Enhancing Security of Voice Data
Published 2010“…The decryption process on the other hand is divided into two main stages: key extraction process, and decryption process. The proposed solution was implemented and tested and the results showed that the required time for the security processes is minimized compared to some known algorithms such as AES_Rijndael algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Design and implementation of multimedia digital matrix system
Published 2005“…The hybrid-reset algorithm is successfully solved the most well known problem of channel synchronization in data oversampling method. …”
Get full text
Get full text
Conference or Workshop Item -
3
-
4
Hysteresis Modelling of Pneumatic Artificial Muscle using General Cubic Equation and Factor Theorem Prediction Method / Mohd Azuwan Mat Dzahir...[et al.]
Published 2017“…However, implementing a complicated control algorithm does not always indicate the best solution that could be used to control the pneumatic artificial muscles. …”
Get full text
Get full text
Article -
5
-
6
Using genetic algorithms to optimise land use suitability
Published 2012“…The Erosion Potential Method (EPM) used in erosion estimation and sediment yield of the study. …”
Get full text
Get full text
Thesis -
7
Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon
Published 2017“…Related work was surveyed in digital watermarking, cryptography and design methodology before implementing the text based watermarking method (embedded and extract/detection of watermarks).The implementation results on text based digital watermarking combined with cryptographic techniques are presented. …”
Get full text
Get full text
Get full text
Thesis -
8
EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique
Published 2016“…The IncFRNN algorithm updates the training set by employing a heuristic update method to maintain representative objects and eliminate rarely used objects. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
-
10
Perturbation stochastic model updating of a bolted structure / Mohamad Azam Shah Aziz Shah
Published 2022“…The SMU method based on the improved model was used to predict the variability of the dynamic behaviour of the structure. …”
Get full text
Get full text
Thesis -
11
Identifying Features Eligiblity For Blood Donors' Preferences Using Artificial Neural Networks Prediction Performances
Published 2017“…These findings of this study contribute as beneficial information to improve blood donation or healthcare service, as guide to collect and arrange data into prediction or another data mining problems, and extend another study for flexible algorithms with various datasets.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Fused multivariate empirical mode decomposition (MEMD) and inverse solution method for EEG source localization
Published 2018“…We also developed an unsupervised algorithm utilizing a wavelet method to remove eye blink artifacts. …”
Get full text
Get full text
Article -
13
Fused multivariate empirical mode decomposition (MEMD) and inverse solution method for EEG source localization
Published 2018“…We also developed an unsupervised algorithm utilizing a wavelet method to remove eye blink artifacts. …”
Get full text
Get full text
Get full text
Article -
14
EEG-and MRI-based epilepsy source localization using multivariate empirical mode decomposition and inverse solution method
Published 2018“…Therefore, in this study a coupled Multivariate Empirical Mode Decomposition (MEMD) with embedded automated artifact remover algorithm and inverse solution method is proposed. …”
Get full text
Get full text
Thesis -
15
Arabic Text Clustering Methods And Suggested Solutions For Theme-based Quran Clustering: Analysis Of Literature
Published 2024journal::journal article -
16
Quantum Processing Framework And Hybrid Algorithms For Routing Problems
Published 2010“…The focus of this study is developing a framework of QAPU and hybrid architecture for classical-quantum algorithms. The framework is used to increase the implementation performance of quantum algorithms. …”
Get full text
Get full text
Thesis -
17
Low-level hybridization scripting language with dynamic parameterization in PSO-GA / Suraya Masrom
Published 2015“…However, in many cases, implementing the suitable hybrid algorithms for a given optimization problem is a considerably difficult, which in most cases, is time consuming. …”
Get full text
Get full text
Thesis -
18
Festive season balancing groceries optimization / Fairuz Mohamed Razi
Published 2012“…This research uses Genetic Algorithms concept and technique to solve an optimization problem in shortage in supply-demand during festive season which is during Hari Raya Aidilfitri. …”
Get full text
Get full text
Thesis -
19
Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking
Published 2012“…The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. The solution consists of an algorithm for automatic collection of candidate seed points using efficient grid line searching mechanism and a validation method which uses local geometric and intensity based features as effective validation rules to discriminate between the actual seed point and false alarms. …”
Get full text
Get full text
Thesis -
20
Cuckoo search algorithm and wind driven optimization based study of satellite image segmentation for multilevel thresholding using Kapur’s entropy
Published 2014“…This algorithm is used to obtain the best solution or best fitness value from the initial random threshold values, and to evaluate the quality of a solution, correlation function is used. …”
Get full text
Get full text
Article
