Search Results - (( solution extraction method algorithm ) OR ( problem implementation using algorithm ))

Refine Results
  1. 1

    New Cryptographic Algorithms for Enhancing Security of Voice Data by Al-Hazaimeh, Obaida Mohammad Awad

    Published 2010
    “…The decryption process on the other hand is divided into two main stages: key extraction process, and decryption process. The proposed solution was implemented and tested and the results showed that the required time for the security processes is minimized compared to some known algorithms such as AES_Rijndael algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Design and implementation of multimedia digital matrix system by Chui, Yew Leong, Ramli, Abdul Rahman, Perumal, Thinagaran, Sulaiman, Mohd Yusof, Ali, Mohd Liakot

    Published 2005
    “…The hybrid-reset algorithm is successfully solved the most well known problem of channel synchronization in data oversampling method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4

    Hysteresis Modelling of Pneumatic Artificial Muscle using General Cubic Equation and Factor Theorem Prediction Method / Mohd Azuwan Mat Dzahir...[et al.] by Mat Dzahir, Mohd Azuwan, Mat Dzahir, Mohd Azwarie, Hussein, Mohamed, Ahmad, Zair Asrar, Mohamad, Maziah, Mad Saad, Shaharil

    Published 2017
    “…However, implementing a complicated control algorithm does not always indicate the best solution that could be used to control the pneumatic artificial muscles. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Using genetic algorithms to optimise land use suitability by Pormanafi, Saeid

    Published 2012
    “…The Erosion Potential Method (EPM) used in erosion estimation and sediment yield of the study. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Pseudo-random number generator (PRNG) combined with text based watermarking for cryptography application / Lew Chee Hon by Lew , Chee Hon

    Published 2017
    “…Related work was surveyed in digital watermarking, cryptography and design methodology before implementing the text based watermarking method (embedded and extract/detection of watermarks).The implementation results on text based digital watermarking combined with cryptographic techniques are presented. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique by Liew, Siaw Hong

    Published 2016
    “…The IncFRNN algorithm updates the training set by employing a heuristic update method to maintain representative objects and eliminate rarely used objects. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Perturbation stochastic model updating of a bolted structure / Mohamad Azam Shah Aziz Shah by Aziz Shah, Mohamad Azam Shah

    Published 2022
    “…The SMU method based on the improved model was used to predict the variability of the dynamic behaviour of the structure. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Identifying Features Eligiblity For Blood Donors' Preferences Using Artificial Neural Networks Prediction Performances by Che Khalid, Nor Syuhada

    Published 2017
    “…These findings of this study contribute as beneficial information to improve blood donation or healthcare service, as guide to collect and arrange data into prediction or another data mining problems, and extend another study for flexible algorithms with various datasets.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    EEG-and MRI-based epilepsy source localization using multivariate empirical mode decomposition and inverse solution method by Khosropanah, Pegah

    Published 2018
    “…Therefore, in this study a coupled Multivariate Empirical Mode Decomposition (MEMD) with embedded automated artifact remover algorithm and inverse solution method is proposed. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Quantum Processing Framework And Hybrid Algorithms For Routing Problems by Soltan Aghaei, Mohammad Reza

    Published 2010
    “…The focus of this study is developing a framework of QAPU and hybrid architecture for classical-quantum algorithms. The framework is used to increase the implementation performance of quantum algorithms. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Low-level hybridization scripting language with dynamic parameterization in PSO-GA / Suraya Masrom by Masrom, Suraya

    Published 2015
    “…However, in many cases, implementing the suitable hybrid algorithms for a given optimization problem is a considerably difficult, which in most cases, is time consuming. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Festive season balancing groceries optimization / Fairuz Mohamed Razi by Mohamed Razi, Fairuz

    Published 2012
    “…This research uses Genetic Algorithms concept and technique to solve an optimization problem in shortage in supply-demand during festive season which is during Hari Raya Aidilfitri. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking by Boroujeni, Farsad Zamani

    Published 2012
    “…The first contribution is automatic detection of seed points which serve as a prerequisite step for centerline extraction algorithm. The solution consists of an algorithm for automatic collection of candidate seed points using efficient grid line searching mechanism and a validation method which uses local geometric and intensity based features as effective validation rules to discriminate between the actual seed point and false alarms. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Cuckoo search algorithm and wind driven optimization based study of satellite image segmentation for multilevel thresholding using Kapur’s entropy by Bhandari, A.K., Singh, V.K, Kumar, A., Singh, G.K.

    Published 2014
    “…This algorithm is used to obtain the best solution or best fitness value from the initial random threshold values, and to evaluate the quality of a solution, correlation function is used. …”
    Get full text
    Get full text
    Article