Search Results - (( using function based algorithm ) OR ( based constructive window algorithm ))

Refine Results
  1. 1

    Reservoir water release dynamic decision model based on spatial temporal pattern by Suriyati, Abdul Mokhtar

    Published 2016
    “…The modified Sliding Window algorithm was used to construct the rainfall temporal pattern, while the spatial information was established by simulating the mapped rainfall and reservoir water level pattern. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique by Liew, Siaw Hong

    Published 2016
    “…The IncFRNN algorithm is able to control the size of training pool using predefined window size threshold. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure by Asbullah, Muhammad Asyraf

    Published 2015
    “…In parallel, we review the AAb cryptosystem based on the design of Rabin-p function over integers and also as a demonstration of the proposed cryptographic hard problem concept. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…The effectiveness of this algorithm is investigated by comparing with other AC based feature extraction algorithms involving AC/LDA (Linear Discriminant Analysis) and AC/PCA (Principal Component Analysis). …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions by Abbas, Iraq Tareq

    Published 2018
    “…The BOGS-BAT algorithm is based on three techniques. The first technique is to move or switch solution from single function to functions that contain more than one objective functions. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources by Al-Qadhi, Abdulrahman K., Athauda, Rukshan, Latip, Rohaya, Hussin, Masnida

    Published 2026
    “…To initialise function placement, Fitness-Based Swap (FBSW) algorithm is proposed which places functions based on pre-defined information such as function size, function maximum execution time, and storage cost. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    New CFAR algorithm and circuit development for radar receiver by Kamal, Mustafa Subhi

    Published 2020
    “…To detect targets in such environments, it needs a robust CFAR algorithm that excises the target spikes and clutter edges from the CFAR window to give the best possible estimation of the noise background. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Computation of cryptosystem based on Lucas functions using addition chain by Md Ali, Zulkarnain, Othman, Mohamed, Md. Said, Mohamad Rushdan, Sulaiman, Md. Nasir

    Published 2010
    “…Cryptosystem based on Lucas Functions is known as LUC Cryptosystem. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    An improved fast scanning algorithm based on distance measure and threshold function in region image segmentation by Ismael, Ahmed Naser

    Published 2016
    “…Hence, this study proposes an Improved Fast Scanning algorithm that is based on Sorensen distance measure and adaptive threshold function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Enhancing speed performance of the cryptographic algorithm based on the lucas sequence by M. Abulkhirat, Esam

    Published 2003
    “…Utilizing the properties of Lucas functions introduced a public key system based on Lucas functions instead of exponentiation, which offer a good alternative to the most publicly used exponential public key system RSA. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Image encryption algorithm based on chaotic mapping by Salleh, Mazleena, Ibrahim, Subariah, Isnin, Ismail Fauzi

    Published 2003
    “…HVT function is based on a two-dimensional chaotic map that utilized Baker’s map algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms by Alzaeemi, Shehab Abdulhabib, Tay, Kim Gaik, Huong, Audrey, Sathasivam, Saratha, Majahar Ali, Majid Khan

    Published 2023
    “…Based on the results, the EP algorithm achieved a higher training rate and simple structure compared with the rest of the algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Biological-based semi-supervised clustering algorithm to improve gene function prediction by Kasim, Shahreen, Deris, Safaai, M. Othman, Razib, Hashim, Rathiah

    Published 2011
    “…However, commonclustering algorithms do not provide a comprehensive approach that look into the three categories of annotations; biologicalprocess, molecular function, and cellular component, and were not tested with different functional annotation database formats.Furthermore, the traditional clustering algorithms use random initialization which causes inconsistent cluster generation and areunable to determine the number of clusters involved. …”
    Get full text
    Get full text
    Article
  18. 18

    Enhancing Harmony Search Parameters Based On Step And Linear Function For Bus Driver Scheduling And Rostering Problems by Mansor, Nur Farraliza

    Published 2018
    “…Therefore,it is of great interest that we find adjustments for these parameters in this research.There are two contributions to this research.The first one is having HMCR parameter using step function and the linear increase function while the second is applying the fret spacing concept on guitars that is associated with mathematical formulae is also applied in the BW parameter.There are three proposed models on the alteration of HMCR parameters based on the use of the fundamental step function;namely,the constant interval of step function, and its dynamic increase and decrease interval functions.The experimental results revealed that our proposed approach is superior to other state of the art harmony searches either in specific or generic cases. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    A Reference Based Surface Defect Segmentation Algorithm For Automatic Optical Inspection System by Wong, Ze-Hao

    Published 2020
    “…Then, the histogram distance function for each location is computed using a pseudo-probability combination of novel histogram distance functions on a clustered histogram. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Cuckoo search algorithm and wind driven optimization based study of satellite image segmentation for multilevel thresholding using Kapur’s entropy by Bhandari, A.K., Singh, V.K, Kumar, A., Singh, G.K.

    Published 2014
    “…This algorithm is used to obtain the best solution or best fitness value from the initial random threshold values, and to evaluate the quality of a solution, correlation function is used. …”
    Get full text
    Get full text
    Article