Search Results - (( using function based algorithm ) OR ( topic identification system algorithm ))

Refine Results
  1. 1

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…To evaluate the algorithm, we conducted two experiments. In the first experiment, we examine the functionality of the system, whether the system is able to identify the summarizing strategies used by students in summary writing. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Speech processing for makhraj recognition (design adaptive filter for noise removal) by Siti Nurmaisarah, Abdul Aziz

    Published 2010
    “…Filter Design Toolbox provides many adaptive filter design functions that use the LMS algorithms to search for the optimal solution to adaptive filter, including system identification and noise cancellation. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3

    Angle Based Protein Tertiary Structure Prediction Using Bees Optimization Algorithm by Al-Qattan, Zakaria Noor Aldeen Mahmood

    Published 2010
    “…In this project, angles based control with Bees Optimization search algorithm were adopted to search with guidance the protein conformational space in order to find the optimum solution. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Study of the Contribution of Nearest-Neighbour Thermodynamic Parameters to the DNA Sequences Generated by Ant Colony Optimisation by Mohd Zaidi, Mohd Tumari, Zuwairie, Ibrahim, Kamarul Hawari, Ghazali, Faradila, Naim, Mohd Falfazli, Mat Jusof, Ismail, Ibrahim, Zulkifli, Md. Yusof, Kamal, Khalil, Muhammad Arif, Abdul Rahim, Sophan Wahyudi, Nawawi

    Published 2013
    “…In the authors’ previous research, an ant colony system (ACS) was proposed to solve the DNA sequence design problem based on nearest neighbour. The Watson-Crick base pair ∆Go37 was used as the distance between nodes for the thermodynamic parameters in the problem models for the heuristic approach in the ACS algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Control of grain drying process using self-tuning quantitative feedback theory by Mansor, Hasmah

    Published 2011
    “…The main reason towards this problem is the inaccuracy of the grain dryer mathematical models which is derived based on assumptions and estimations used in designing the control system. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Hybrid intelligent methods for parameter identification and load frequency control in power system by Aqeel Sakhy, Jaber

    Published 2014
    “…The Thesis is divided into two parts in accordance to the topic. Where, in the first part, the coherent identification algorithm for single and multi-area power systems with disturbances is proposed. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Human identification system based on moment invariant features by Mohd Ibrahim, Azhar, Shafie, Amir Akramin, Rashid, Muhammad Mahbubur

    Published 2012
    “…Video surveillance is an active research topic in computer vision. Recent research in video surveillance system has shown an increasing focus on creating reliable systems utilizing non-computationally expensive technique for detecting and observing humans’ appearance, movements and activities. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Autonomous Camera Alignment System by Salehian, Sina

    Published 2017
    “…The highest rate of success in verification or identification is achieved when a high resolution picture is taken, with the camera positioned exactly in front of the subject’s face, as demonstrated by some of the previous studies done on the topic. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions by Abbas, Iraq Tareq

    Published 2018
    “…The BOGS-BAT algorithm is based on three techniques. The first technique is to move or switch solution from single function to functions that contain more than one objective functions. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources by Al-Qadhi, Abdulrahman K., Athauda, Rukshan, Latip, Rohaya, Hussin, Masnida

    Published 2026
    “…To initialise function placement, Fitness-Based Swap (FBSW) algorithm is proposed which places functions based on pre-defined information such as function size, function maximum execution time, and storage cost. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Computation of cryptosystem based on Lucas functions using addition chain by Md Ali, Zulkarnain, Othman, Mohamed, Md. Said, Mohamad Rushdan, Sulaiman, Md. Nasir

    Published 2010
    “…Cryptosystem based on Lucas Functions is known as LUC Cryptosystem. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    An improved fast scanning algorithm based on distance measure and threshold function in region image segmentation by Ismael, Ahmed Naser

    Published 2016
    “…Hence, this study proposes an Improved Fast Scanning algorithm that is based on Sorensen distance measure and adaptive threshold function. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Enhancing speed performance of the cryptographic algorithm based on the lucas sequence by M. Abulkhirat, Esam

    Published 2003
    “…Utilizing the properties of Lucas functions introduced a public key system based on Lucas functions instead of exponentiation, which offer a good alternative to the most publicly used exponential public key system RSA. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Image encryption algorithm based on chaotic mapping by Salleh, Mazleena, Ibrahim, Subariah, Isnin, Ismail Fauzi

    Published 2003
    “…HVT function is based on a two-dimensional chaotic map that utilized Baker’s map algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Plant leaf recognition algorithm using ant colony-based feature extraction technique by Ghasab, Mohammad Ali Jan

    Published 2013
    “…Then, based on the characteristics of each species, decision making is done by means of ant colony optimisation as a search algorithm to return the optimal subset of features regarding the related species. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms by Alzaeemi, Shehab Abdulhabib, Tay, Kim Gaik, Huong, Audrey, Sathasivam, Saratha, Majahar Ali, Majid Khan

    Published 2023
    “…Based on the results, the EP algorithm achieved a higher training rate and simple structure compared with the rest of the algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Biological-based semi-supervised clustering algorithm to improve gene function prediction by Kasim, Shahreen, Deris, Safaai, M. Othman, Razib, Hashim, Rathiah

    Published 2011
    “…However, commonclustering algorithms do not provide a comprehensive approach that look into the three categories of annotations; biologicalprocess, molecular function, and cellular component, and were not tested with different functional annotation database formats.Furthermore, the traditional clustering algorithms use random initialization which causes inconsistent cluster generation and areunable to determine the number of clusters involved. …”
    Get full text
    Get full text
    Article