Search Results - (( using function based algorithm ) OR ( based transformation method algorithm ))
Search alternatives:
- based transformation »
- method algorithm »
- using function »
-
1
Denosing of natural image based on non-linear threshold filtering using discrete wavelet transformation
Published 2014“…This paper treats with threshold estimation technique to reduce the noise in natural images by using on discrete wavelet transformation. Calculating the value of thresholding, the way it works in the algorithm (derivation of thresholding function) and the type of wavelet mother functions, are pivotal issues in the field of denoising based wavelet approach. …”
Get full text
Get full text
Article -
2
Clustering Spatial Data Using a Kernel-Based Algorithm
Published 2005“…Therefore, this work comes up with new clustering algorithm using kernel-based methods for effective and efficient data analysis by exploring structures in the data.…”
Get full text
Get full text
Conference or Workshop Item -
3
-
4
Assisted History Matching by Using Genetic Algorithm and Discrete Cosine Transform
Published 2014“…Later, an algorithm combining both Genetic Algorithm and Discrete Cosine Transform was proposed, which shows the step-by-step sequence of both methods. …”
Get full text
Get full text
Final Year Project -
5
Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation
Published 2022“…The purpose of this project is to reduce dynamic thermal power dissipation of SHA-256 unfolding transformation. State encoding is a method used in reducing power design strategies that have been proposed to lower the dynamic power dissipation of the algorithm. …”
Get full text
Get full text
Get full text
Proceeding -
6
Identifying Students' Summary Writing Strategies Using Summary Sentence Decomposition Algorithm
Published 2011“…We first analyzed experts' written summaries, extracted the strategies used in the summaries, formulated a set of heuristics rules to define the strategies and finally transformed the rules using position-based method into summary sentence decomposition algorithm (SSDA). …”
Get full text
Get full text
Get full text
Article -
7
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…The HHT is a way to decompose a signal into intrinsic mode functions (IMF). However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method, which is Hilbert Transform (HT). …”
Get full text
Get full text
Thesis -
8
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…This research also proposes a new method namely RotateSwapDeterminant function that uses rotation and swapping of the bit based on the 4x4 determinant computations and will act as the permutation layer in the DDBC algorithm. …”
Get full text
Get full text
Thesis -
9
-
10
FPGA-based Implementation of SHA-256 with Improvement of Throughput using Unfolding Transformation
Published 2022“…The unfolding method is employed in the hash function by producing the hash value output based on modifying the SHA-256 structure. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Estimation of Response Transfer Functions of Offshore Structures Using the Time-Varying ARX Model
Published 2013“…Here, we outline a practical algorithm for TVARX model which uses expectation-maximization (EM) algorithm based on Kalman smoother to generate the transfer function. …”
Get full text
Get full text
Conference or Workshop Item -
12
High-Throughput of SHA-256 Hash Function with Unfolding Transformation
Published 2019“…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
Get full text
Get full text
Proceeding -
13
High-Throughput of SHA-256 Hash Function with Unfolding Transformation
Published 2019“…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
Get full text
Get full text
Proceeding -
14
Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz)
Published 2017“…The current paper presented the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) for the purpose of self-decision method in selecting IMF with the correct IMF selecting criterion. …”
Get full text
Get full text
Get full text
Article -
15
Effect of fitness function on localization performance in range-free localization algorithm
Published 2024“…Besides, the advantage and disadvantage of each localization fitness function are also given. Finally, an advanced localization fitness function is proposed based on the above experimental results, which will provide a guide and reference for selection and improvement of the fitness function in range-free localization algorithm.…”
Get full text
Get full text
Get full text
Get full text
Article -
16
Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y...
Published 2017“…The current paper presented the implementation of Integrated Kurtosis-based Algorithm for z-filter Technique (I-Kaz) to kurtosis ratio (I-Kaz-Kurtosis) for the purpose of self-decision method in selecting IMF with the correct IMF selecting criterion. …”
Get full text
Get full text
Article -
17
Face recognition using integrated discrete cosine transform and kernel fisher discriminant analysis
Published 2023“…As a result, Fisher Linear Discriminant Analysis (FLD) based methods suffers due to singularity problem (of scatter matrix). …”
Conference paper -
18
Efficient dynamic DNA-based block cipher algorithm
Published 2023“…Additionally, a DNA-based ShiftRow function was proposed to enhance the execution of permutation by methodically displacing the rows of the state array using different offset values. …”
Get full text
Get full text
Thesis -
19
Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar
Published 2017“…To improve the proposed algorithm, GA was utilized to identify the best choice for ‘‘mother wavelet function” and “decomposition level” of the signals by means of the fundamental fitness function. …”
Get full text
Get full text
Get full text
Thesis -
20
Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid
Published 2008“…Thus, this project will introduce a genetic-algorithms-based technique to overcome the rounding error problem. …”
Get full text
Get full text
Thesis
