Search Results - (( using function method algorithm ) OR ( basic evaluation method algorithm ))

Refine Results
  1. 1

    Data depublication using : Hashing algorithm / Naimah Nayan by Nayan, Naimah

    Published 2019
    “…The objective of this project is to compare MD5 & SHA-1 algorithm in data deduplication technique and to evaluate the MD5 & SHA-1 algorithm, length of message digest and speed using deduplication software. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Nomadic people optimizer (NPO) for large-scale optimization problems by Mohamd Salih, Sinan Qahtan

    Published 2019
    “…The NPO was tested and evaluated based on sixty unconstrained benchmark test functions. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…The gain and the Jacobian matrices associated with the basic algorithm require large storage and have to be evaluated at every iteration, resulting in more computation time. …”
    Get full text
    Get full text
    Thesis
  6. 6

    BMTutor research design: Malay sentence parse tree visualization by Muhamad Noor, Yusnita, Jamaludin, Zulikha

    Published 2014
    “…This paper discusses the research design for BMTutor.BMTutor is a prototype for visualizing Malay sentences that is combined with sentence checker, sentence correction and word attribute components.The purpose of BMTutor is to check sentence validation, provide sentence correction for invalid sentence used and produce parse tree visualization.The research design involved can be divided into four phases; categorizing sentence and produce repository (Phase1), developing models and algorithms (Phase 2); development of a prototype (Phase 3); and prototype testing (Phase 4).To date, this system is the only one designed with the functions and characteristics as in BMTutor.There are two BM parsers to check the validity of simple BM sentences had been developed.Both parsers performed three phases in research design, namely 1) the collection of sentence or CFG, 2) develop a prototype, and 3) conduct evaluation.The phases involved are the basic method in developing a prototype. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Modeling and control of a Pico-satellite attitude using Fuzzy Logic Controller by Zaridah, Mat Zain

    Published 2010
    “…In this regards, a new method of Pico-satellite attitude control using Mamdani Fuzzy Logic Principles is introduced. …”
    Get full text
    Thesis
  8. 8

    Improving Attentive Sequence-to-Sequence Generative-Based Chatbot Model Using Deep Neural Network Approach by Wan Solehah, Wan Ahmad

    Published 2022
    “…The strategies applied showed that the final accuracy obtained through the training after implementing a modification in the algorithm is at 81% accuracy rate compared to the basic model that recorded its final accuracy at 79% accuracy rate. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Hybrid-discrete multi-objective particle swarm optimization for multi-objective job-shop scheduling by Anuar, Nurul Izah

    Published 2022
    “…This research first proposes an improved continuous MOPSO to address the rapid clustering problem that exists in the basic PSO algorithm using three improvement strategies: re-initialization of particles, systematic switch of best solutions and mutation on global best selection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Robust Kernel Density Function Estimation by Dadkhah, Kourosh

    Published 2010
    “…The classical kernel density function estimation approach is widely used in various formula and methods. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Fingerprint Image Compression Using Wavelet Transform by Hanashi, Abdalla Musbah

    Published 2003
    “…In fact, wavelet refers to a set of basic function, which is recursively defined form, a set of scaling coefficients and scaling function. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Extention and cryptanalysis of golden cryptography by Sharabyan, Mohammad Tahghighi

    Published 2015
    “…Finally, the experimental results, using several images (Lena, Nike, Micky, and Damavand) and three measuring factors were evaluated. …”
    Get full text
    Get full text
    Thesis
  13. 13

    CYCLOSTATIONARY FEATURES BASED LOW COMPLEXITY MUTLIRESOLUTION SPECTRUM SENSING FOR COGNITVE RADIO APPLICATIONS by Adoum, Bakhit Amine Adoum

    Published 2011
    “…Both subjective and objective evaluation show that the proposed scheme is not only superior to the commonly used energy detection method but also to various multi-resolution sensing techniques as it relies on the robustness of cyclostationary feature detection. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    FEATURES EXTRACTION OF HEP-2 IMMUNOFLUORESCENCE PATTERNS BASED ON TEXTURE AND REGION OF INTEREST TECHNIQUES by MD HASIM, SITI MASTURA

    Published 2013
    “…Image segmentation will be done after pre-processing completed to further enhance the image according to its edge or region to be used for the input image. Different methods of features extraction will be used and compared for better outcome. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Development Of Double Stage Filter (DSF) On Stereo Matching Algorithm For 3D Computer Vision Applications by Teo, Chee Huat

    Published 2016
    “…Based on the results of evaluations, the results obtained by DSF is better than the algorithms, basic block matching and dynamic programming.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    MM-PNEMO: a mathematical model to assess handoff delay and packet loss by Islam, Shayla, Hassan Abdalla Hashim, Aisha, Hasan, Mohammad Kamrul, abdur razzaque, Md.

    Published 2019
    “…Moreover, the wireless nodes are typically small that results in resource-constrained. Thus, it is uphill to use algorithms having giant processing power or memory footprint. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Finding the root of nonlinear function using five bracketing method / Nur Afiqah Mohamed Azhar by Mohamed Azhar, Nur Afiqah

    Published 2019
    “…Therefore, numerical method in the form of bracketing method is often used to find only the approximate root of the function. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus by Darus, Zamzuhairi

    Published 2003
    “…Voltage stability margin (VSM) can be basically identified by the multi-solution load flow calculation method. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions by Abbas, Iraq Tareq

    Published 2018
    “…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
    Get full text
    Get full text
    Thesis