Search Results - (( using (vectorisation OR factorization) based algorithm ) OR ( using function method algorithm ))

Refine Results
  1. 1

    A study on regional GDP forecasting analysis based on radial basis function neural network with genetic algorithm (RBFNN-GA) for Shandong economy by Qing, Zhang, Abdullah, Abdul Rashid, Choo, Wei Chong, Ali, Mass Hareeza

    Published 2022
    “…This stochastic learning method is a useful addition to the existing methods for determining the center and smoothing factors of radial basis function neural networks, and it can also help the network more efficiently train. …”
    Get full text
    Get full text
    Article
  2. 2

    Firefly analytical hierarchy algorithm for optimal allocation and sizing of distributed generation in radial distribution network by Bujal, Noor Ropidah

    Published 2022
    “…As for multi-objective functions associated with the optimisation problem, a weight-sum method is typically used to determine each objective function's coefficient factors (CF). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Optimization Of Pid Controller Using Grey Wolf Optimzer And Dragonfly Algorithm by Nik Mohamed Hazli, Nik Muhammad Aiman

    Published 2018
    “…In this research, swarming intelligence is used to solve optimisation problem. Grey Wolf Optimizer and Dragonfly Algorithm were chosen. …”
    Get full text
    Get full text
    Monograph
  4. 4

    Nlfxlms and thf-nlfxlms algorithms for wiener-hammerstein nonlinear active noise control by Srazhidinov, Radik

    Published 2016
    “…In recent works, it was shown that the SEF can be approximated using tangential hyperbolic function (THF) for Hammerstein and Wiener NLFXLMS algorithms, such that the degree of nonlinearity can be estimated using modelling approach. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Modeling time series data using Genetic Algorithm based on Backpropagation Neural network by Haviluddin

    Published 2018
    “…This study showed the task of optimizing the topology structure and the parameter values (e.g., weights) used in the BPNN learning algorithm by using the GA. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Design Methodology and Analysis of Hash Function based-on Field Programmable Gate Array for Hash-based Message Authentication Code Application by SHAMSIAH BINTI, SUHAILI

    Published 2025
    “…The main objective of this research is to formulate unfolding transformation factor 2 and factor 4 methods into hash function design. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Evaluation of lightning return stroke current using measured electromagnetic fields by Mahdi, Izadi

    Published 2012
    “…Moreover, in the proposed method, the attenuation height dependent factor can be determined using measured field while assuming it to be an unknown function based on the engineering model. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Disparity map algorithm for stereo matching process using local based method by Gan, Melvin Yeou Wei

    Published 2022
    “…Global method performs a matching process using global energy or a probability function over the whole image. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed by Borujeni, Sattar Chavoshi

    Published 2012
    “…In recent years soft computing methods like fuzzy logic and genetic algorithm are being used in modeling complex processes of hydrologic events. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Determination of dengue hemorrhagic fever disease factors using neural network and genetic algorithms / Yuliant Sibaroni, Sri Suryani Prasetiyowati and Iqbal Bahari Sudrajat by Yuliant, Sibaroni, Sri Suryani, Prasetiyowati, Iqbal Bahari, Sudrajat

    Published 2020
    “…In this study, the problem of determination dengue disease factors was modeled using a neural network. The activation function in this neural network model then estimated using genetic algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Effect of fitness function on localization performance in range-free localization algorithm by Han, Fengrong, Izzeldin Ibrahim, Mohamed Abdelaziz, Kamarul Hawari, Ghazali, Zhao, Yue

    Published 2024
    “…How to choose the best localization fitness function for a specific target is a key factor in determining whether the localization algorithm is accurate or not. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Graph-Based Algorithm With Self-Weighted And Adaptive Neighbours Learning For Multi-View Clustering by He, Yanfang

    Published 2024
    “…Particularly, swmcan addresses multi-view data noise using the l1-norm and optimizes the objective function through a novel iterative reweighted method. …”
    Get full text
    Get full text
    Thesis
  13. 13

    FPGA-based Implementation of SHA-256 with Improvement of Throughput using Unfolding Transformation by Shamsiah, Suhaili, Norhuzaimin, Julai

    Published 2022
    “…The SHA-256 hash function factor four hardware implementation was successfully tested using the Altera DE2-115 FPGA board. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Self-adaptive conjugate method for a robust and efficient performance measure approach for reliability-based design optimization by Keshtegar, Behrooz, Baharom, Shahrizan, El-Shafie, Ahmed

    Published 2018
    “…The advanced mean value and hybrid mean value methods are commonly used to evaluate the probabilistic constraint of reliability-based design optimization (RBDO) problems. …”
    Get full text
    Get full text
    Article
  15. 15

    The Multi-Objective Optimization Algorithm Based on Sperm Fertilization Procedure (MOSFP) Method for Solving Wireless Sensor Networks Optimization Problems in Smart Grid Applicatio... by Shehadeh, Hisham A., Idris, Mohd Yamani Idna, Ahmedy, Ismail, Ramli, Roziana, Noor, Noorzaily Mohamed

    Published 2018
    “…Our proposed method, named Multi-Objective Optimization Algorithm Based on Sperm Fertilization Procedure (MOSFP), along with other three state-of-The-Art multi-objective optimization algorithms known as OMOPSO, NSGA-II and SPEA2, are utilized in this study. …”
    Get full text
    Get full text
    Article
  16. 16

    High-Throughput of SHA-256 Hash Function with Unfolding Transformation by Shamsiah, Binti Suhaili, Watanabe, Takahiro

    Published 2019
    “…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
    Get full text
    Get full text
    Proceeding
  17. 17

    High-Throughput of SHA-256 Hash Function with Unfolding Transformation by Shamsiah, Binti Suhaili, Watanabe, Takahiro

    Published 2019
    “…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
    Get full text
    Get full text
    Proceeding
  18. 18

    Enhancement of Ant System Algorithm for Course Timetabling Problem by Djamarus, Djasli

    Published 2009
    “…This research starts with developing an algorithm based on original concept of Ant System Algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Optimum grouping in a modified genetic algorithm for discrete-time, non-linear system identification by Abd Samad, Md Fahmi

    Published 2007
    “…The genetic algorithm approach is widely recognized as an effective and flexible optimization method for system identification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm by Khor, Lay Hoong

    Published 2006
    “…However, until now, the cryptography hardware is still not commonly used especially in FPGA. In this project, the Blowfish encryption algorithm is chosen because it is among the safest algorithm used nowadays. …”
    Get full text
    Get full text
    Monograph