Search Results - (( using equalization based algorithm ) OR ( using application based algorithm ))
Search alternatives:
- using equalization »
- using application »
- application based »
-
1
Application of Bat Algorithm and Its Modified Form Trained with ANN in Channel Equalization
Published 2022“…An alternative approach to training neural network-based equalizers is to use metaheuristic algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
2
-
3
Segmentation of MRI brain images using statistical approaches
Published 2011“…Therefore, these algorithms can be improved upon. A neighbourhood-based noise-reduction algorithm which uses the edges of an image is proposed. …”
Get full text
Get full text
Thesis -
4
Selective harmonic elimination in multilevel inverter using hybrid APSO algorithm
Published 2018“…The proposed algorithm is applicable to all levels of MLI having equal and non-equal DC sources. …”
Get full text
Get full text
Article -
5
Cellular Automata-based Algorithm for Liquid Diffusion Phenomenon Modeling using imaging technique
Published 2013“…First, a mathematical method is proposed in order to track and then analyze the real diffusion behavior. This method has used thousands of original images. Then, thousands of images, as the same number of original images, are created by the CA-based algorithm. …”
Get full text
Get full text
Thesis -
6
Improved power output forecastingtechnique for effective battery management in photovoltaic system / Utpal Kumar Das
Published 2019“…A PSO-based algorithm is adopted for the appropriate selection of dominated parameters of SVR-based model to achieve better performance. …”
Get full text
Get full text
Get full text
Thesis -
7
Modified Contrast Limited Adaptive Histogram Equalization for high dynamic range images
Published 2012“…The algorithm was written by using MATLAB software. The local tone mapping method is based on the modified contrast limited adaptive histogram equalization (CLAHE) method. …”
Get full text
Get full text
Thesis -
8
Microcrack Detection And Noise Reduction In Integrated Circuit Packages
Published 2018“…For the second algorithm, histogram equalization method has three stages, (i) image contrast enhancement through histogram equalization, (ii) image crack segmentation which subtracts the histogram equalized image with the image before histogram equalization process before merging the images using bitwise operation, and (iii) image denoising using morphological opening. …”
Get full text
Get full text
Monograph -
9
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…Another structure of MLP trained using backpropagation algorithm is used to detect and locate the base of the young corn tree using the skeleton of the segmented image. …”
Get full text
Get full text
Thesis -
10
-
11
Loop-based RSA Key Generation Algorithm using String Identity
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Hybrid Improved Bacterial Swarm Optimization Algorithm for Hand-Based Multimodal Biometric Authentication System
Published 2019“…In the proposed HIBS algorithm, the slow convergence of BFO algorithm was mitigated by using the random walk procedure of Firefly algorithm as an adaptive varying step size instead of using fixed step size. …”
Get full text
Get full text
Article -
13
Enhanced Harris's Hawk algorithm for continuous multi-objective optimization problems
Published 2020“…This indicates the capability of the algorithm in exploring the search space. The 2S-ENDSHHMO algorithm can be used to improve the search process of other MOSI-based algorithms and can be applied to solve MOPs in applications such as structural design and signal processing.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Fuzzy logic-based algorithm resource scheduling for improving the reliability of cloud computing
Published 2016“…This study designed a system based on fuzzy logic and followed by an introduction of an efficient and precise algorithm for scheduling resources for improving the reliability of cloud computing. …”
Get full text
Get full text
Get full text
Article -
15
A comparison of watermarking image quality based on dual intermediate significant bit with genetic algorithm
Published 2013“…The quality of the watermarked images is considered as one of the most important requirements of any watermarking system.In most applications, the watermarking algorithm embeds the watermark without affecting the quality of the host media.In this study, a comparison of watermarking image quality was performed between two existing methods: Dual Intermediate Significant Bit (DISB) an d Genetic Algorithm (GA).The first method focuses on the high quality of the watermarked image based on DISB model and this method requires embedding two bits into every pixel of the original image, while the other six bits are modified so as to immediately assimilate the original pixel. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
A variant fisher and Jaikuamr algorithm to solve capacitated vehicle routing problem
Published 2017“…Route generation is a traveling sales man problem (TSP) and any TSP optimization method is useful for this purpose. Fisher and Jaikumar algorithm is a well-known cluster based method which creates clusters with a geometric method partitioning the customer plane into equal angular cones where the total cones are equal to the number of vehicles. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
-
18
Reduced-rank technique for joint channel estimation in TD-SCDMA systems.
Published 2013“…Multi-user joint data detectors based linear equalizers are used to suppress inter-symbol interference and mitigate intra-cell multiple access interference. …”
Get full text
Get full text
Article -
19
Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems
Published 2013“…Multi-user joint data detectors based linear equalizers are used to suppress inter-symbol interference and mitigate intra-cell multiple access interference. …”
Get full text
Get full text
Article -
20
