Search Results - (( using function method algorithm ) OR ( basic evaluation using algorithm ))

Refine Results
  1. 1

    Data depublication using : Hashing algorithm / Naimah Nayan by Nayan, Naimah

    Published 2019
    “…The objective of this project is to compare MD5 & SHA-1 algorithm in data deduplication technique and to evaluate the MD5 & SHA-1 algorithm, length of message digest and speed using deduplication software. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli by Dzulkifli, Muhammad Zulhilmie

    Published 2021
    “…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Stereo matching algorithm using census transform and segment tree for depth estimation by Hamzah, Rostam Affendi, Zainal Azali, Muhammad Nazmi, Mohd Noh, Zarina, Tengku Wook, Tg Mohd Faisal, Zainal Abidin, Izwan

    Published 2023
    “…This article proposes an algorithm for stereo matching corresponding process that will be used in many applications such as augmented reality, autonomous vehicle navigation and surface reconstruction. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Nomadic people optimizer (NPO) for large-scale optimization problems by Mohamd Salih, Sinan Qahtan

    Published 2019
    “…The NPO was tested and evaluated based on sixty unconstrained benchmark test functions. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…The gain and the Jacobian matrices associated with the basic algorithm require large storage and have to be evaluated at every iteration, resulting in more computation time. …”
    Get full text
    Get full text
    Thesis
  6. 6

    BMTutor research design: Malay sentence parse tree visualization by Muhamad Noor, Yusnita, Jamaludin, Zulikha

    Published 2014
    “…As a result of the lack of models and algorithms have been introduced in both parsers, the model and algorithm development phase is introduced in the design of BMTutor.Output from the development process shows that the prototype is able to provide sentence correction for all 15 invalid sentences and can produce parse tree visualizations for all 20 sentences used for prototype testing.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Modeling and control of a Pico-satellite attitude using Fuzzy Logic Controller by Zaridah, Mat Zain

    Published 2010
    “…In this regards, a new method of Pico-satellite attitude control using Mamdani Fuzzy Logic Principles is introduced. …”
    Get full text
    Thesis
  8. 8

    Hybrid-discrete multi-objective particle swarm optimization for multi-objective job-shop scheduling by Anuar, Nurul Izah

    Published 2022
    “…This research first proposes an improved continuous MOPSO to address the rapid clustering problem that exists in the basic PSO algorithm using three improvement strategies: re-initialization of particles, systematic switch of best solutions and mutation on global best selection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Fingerprint Image Compression Using Wavelet Transform by Hanashi, Abdalla Musbah

    Published 2003
    “…It means that there exists a large selection of wavelet families depending on choice of wavelet function. The objective of this study is to evaluate a variety of wavelet filters using Wavelet toolbox for selecting the best wavelet filters to be used in compress and decompress of selected fingerprint images. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    CYCLOSTATIONARY FEATURES BASED LOW COMPLEXITY MUTLIRESOLUTION SPECTRUM SENSING FOR COGNITVE RADIO APPLICATIONS by Adoum, Bakhit Amine Adoum

    Published 2011
    “…Both subjective and objective evaluation show that the proposed scheme is not only superior to the commonly used energy detection method but also to various multi-resolution sensing techniques as it relies on the robustness of cyclostationary feature detection. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Extention and cryptanalysis of golden cryptography by Sharabyan, Mohammad Tahghighi

    Published 2015
    “…Finally, the experimental results, using several images (Lena, Nike, Micky, and Damavand) and three measuring factors were evaluated. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Robust Kernel Density Function Estimation by Dadkhah, Kourosh

    Published 2010
    “…The classical kernel density function estimation approach is widely used in various formula and methods. …”
    Get full text
    Get full text
    Thesis
  14. 14

    FEATURES EXTRACTION OF HEP-2 IMMUNOFLUORESCENCE PATTERNS BASED ON TEXTURE AND REGION OF INTEREST TECHNIQUES by MD HASIM, SITI MASTURA

    Published 2013
    “…This project involves developing features extraction technique of HEp-2 cell of 2 main patterns namely Nucleolar and Centromere using texture and region of interest technique. Next, to design an algorithm that can automatically identify the 2 patterns of the HEp-2 cell tested using ANA. …”
    Get full text
    Get full text
    Final Year Project
  15. 15
  16. 16

    MM-PNEMO: a mathematical model to assess handoff delay and packet loss by Islam, Shayla, Hassan Abdalla Hashim, Aisha, Hasan, Mohammad Kamrul, abdur razzaque, Md.

    Published 2019
    “…Moreover, the wireless nodes are typically small that results in resource-constrained. Thus, it is uphill to use algorithms having giant processing power or memory footprint. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Routing performance enhancement in hierarchical torus network by link-selection algorithm by Rahman, M.M. Hafizur, Horiguchi, Susumu

    Published 2005
    “…We evaluate the dynamic communication performance of an HTN using dimension-order routing and link-selection algorithms under various traffic patterns. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Dynamic communication performance enhancement in hierarchical torus network by selection algorithm by Rahman, M.M. Hafizur, Sato, Yukinori, Inoguchi, Yasushi

    Published 2012
    “…The dynamic communication performances of an HTN is evaluated by using dimension-order routing and proposed adaptive routing algorithms under various traffic patterns. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Adaptive routing algorithms and implementation for TESH network by Miura, Yasuyuki, Kaneko, Masahiro, Rahman, M.M. Hafizur, Watanabe, Shigeyoshi

    Published 2013
    “…It is found that the communication performance of a TESH network using these adaptive algorithms is better than when the dimension-order routing algorithm is used.…”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Finding the root of nonlinear function using five bracketing method / Nur Afiqah Mohamed Azhar by Mohamed Azhar, Nur Afiqah

    Published 2019
    “…Therefore, numerical method in the form of bracketing method is often used to find only the approximate root of the function. …”
    Get full text
    Get full text
    Thesis