Search Results - (( using function method algorithm ) OR ( based transformation method algorithm ))

Refine Results
  1. 1

    Clustering Spatial Data Using a Kernel-Based Algorithm by Awan, A. Majid, Md. Sap, Mohd. Noor

    Published 2005
    “…Therefore, this work comes up with new clustering algorithm using kernel-based methods for effective and efficient data analysis by exploring structures in the data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Review of image denoising algorithms based on the wavelet transformation by Khmag, Asem, Ramli, Abdul Rahman, Hashim, Shaiful Jahari, Syed Mohamed, Syed Abdul Rahman Al-Haddad

    Published 2013
    “…The search for efficient image denoising methods is still a valid challenge at the crossing of functional analysis and statistics. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Assisted History Matching by Using Genetic Algorithm and Discrete Cosine Transform by Abdul Rashid, Abdul Hadi

    Published 2014
    “…Later, an algorithm combining both Genetic Algorithm and Discrete Cosine Transform was proposed, which shows the step-by-step sequence of both methods. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Denosing of natural image based on non-linear threshold filtering using discrete wavelet transformation by Khmag, Asem, Ramli, Abdul Rahman, Syed Mohamed, Syed Abdul Rahman Al-Haddad, Hashim, Shaiful Jahari

    Published 2014
    “…This paper treats with threshold estimation technique to reduce the noise in natural images by using on discrete wavelet transformation. Calculating the value of thresholding, the way it works in the algorithm (derivation of thresholding function) and the type of wavelet mother functions, are pivotal issues in the field of denoising based wavelet approach. …”
    Get full text
    Get full text
    Article
  5. 5

    Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique by Muhammad Hanafi, Yusop

    Published 2018
    “…The HHT is a way to decompose a signal into intrinsic mode functions (IMF). However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method, which is Hilbert Transform (HT). …”
    Get full text
    Get full text
    Thesis
  6. 6

    Performance Analysis of ARMA based Magnetic Resonance Imaging (MRI) Reconstruction Algorithm by Salami, Momoh Jimoh Emiyoka, Najeeb, Athaur Rahman

    Published 2012
    “…The proposed model coefficients determination in conjunction with various methods of optimal model order determination were then applied on MRI data using both Transient Error Reconstruction Algorithm (TERA) and modified Transient Error Reconstruction Algorithm to obtain images with improved resolution. …”
    Get full text
    Get full text
    Monograph
  7. 7

    Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid by Zahid, Zuhaili

    Published 2008
    “…Thus, this project will introduce a genetic-algorithms-based technique to overcome the rounding error problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    FPGA-based Implementation of SHA-256 with Improvement of Throughput using Unfolding Transformation by Shamsiah, Suhaili, Norhuzaimin, Julai

    Published 2022
    “…The unfolding method is employed in the hash function by producing the hash value output based on modifying the SHA-256 structure. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Development of intelligent leak detection system based on artificial pressure transient signal using integrated Kurtosis-based Algorithm for Z-filter Technique (I-Kaz) by Hanafi, M. Yusop, M. F., Ghazali, Mohd Fadhlan, Mohd Yusof, Wan Sofian, Wan Hamat

    Published 2017
    “…HHT is a way to decompose a signal into intrinsic mode function (IMF). However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method which is Hilbert Transform (HT). …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Identifying Students' Summary Writing Strategies Using Summary Sentence Decomposition Algorithm by Idris, Norisma, Baba, Mohd Sapiyan, Abdullah, Rukaini

    Published 2011
    “…We first analyzed experts' written summaries, extracted the strategies used in the summaries, formulated a set of heuristics rules to define the strategies and finally transformed the rules using position-based method into summary sentence decomposition algorithm (SSDA). …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Dynamic determinant matrix-based block cipher algorithm by Juremi, Julia

    Published 2018
    “…This research also proposes a new method namely RotateSwapDeterminant function that uses rotation and swapping of the bit based on the 4x4 determinant computations and will act as the permutation layer in the DDBC algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation by Shamsiah, Suhaili, Norhuzaimin, Julai, Asrani, Lit, Maimun Binti, Huja Hussin, Mohamad Faizrizwan bin, Mohd Sabri

    Published 2022
    “…The purpose of this project is to reduce dynamic thermal power dissipation of SHA-256 unfolding transformation. State encoding is a method used in reducing power design strategies that have been proposed to lower the dynamic power dissipation of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  13. 13

    Global Algorithms for Nonlinear Discrete Optimization and Discrete-Valued Optimal Control Problems by Woon, Siew Fang

    Published 2009
    “…The transformed problemis then decomposed into a bi-level optimization problem, which is solved using a combination of an efficient discrete filled function method identified earlier and a computational optimal control technique based on the concept of control parameterization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Development of Intelligent Leak Detection System Based on Artificial Pressure Transient Signal Using Integrated Kurtosis-Based Algorithm for Z-Filter Technique (I-Kaz) / Hanafi.M.Y... by M.Yusop, Hanafi, Ghazali, M.F., M.Yusof, M.F., W.Hamat, W.S.

    Published 2017
    “…HHT is a way to decompose a signal into intrinsic mode function (IMF). However, this method has the difficulty in selecting the suitable IMF for the next data post-processing method which is Hilbert Transform (HT). …”
    Get full text
    Get full text
    Article
  15. 15

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Image classification using two dimensional wavelet coefficients with parallel computing by Ong, Yew Fai

    Published 2020
    “…The raster graphics are decomposed using various kind of wavelets together with numerous type of methods in this research to examine the process and the output coefficients of wavelet transform. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Estimation of Response Transfer Functions of Offshore Structures Using the Time-Varying ARX Model by Yazid, Edwar, Liew, M. S., Parman, Setyamartana, Kurian, V.J.

    Published 2013
    “…Here, we outline a practical algorithm for TVARX model which uses expectation-maximization (EM) algorithm based on Kalman smoother to generate the transfer function. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    High-Throughput of SHA-256 Hash Function with Unfolding Transformation by Shamsiah, Binti Suhaili, Watanabe, Takahiro

    Published 2019
    “…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
    Get full text
    Get full text
    Proceeding
  19. 19

    High-Throughput of SHA-256 Hash Function with Unfolding Transformation by Shamsiah, Binti Suhaili, Watanabe, Takahiro

    Published 2019
    “…Hash Function in cryptography algorithms is used to encrypt the message by giving the appropriate output based on the structure of the hash function itself. …”
    Get full text
    Get full text
    Proceeding
  20. 20

    A fingerprint matching algorithm using bit-plane extraction method with phase-only correlation by Florence, Francis-Lothai, Bong, David B L

    Published 2017
    “…This paper introduces a new method in fingerprint feature extraction based on bit-plane. …”
    Get full text
    Get full text
    Get full text
    Article