Search Results - (( using function method algorithm ) OR ( basic evaluation using algorithm ))
Search alternatives:
- method algorithm »
- basic evaluation »
- evaluation using »
- function method »
- using algorithm »
- using function »
-
1
Data depublication using : Hashing algorithm / Naimah Nayan
Published 2019“…The objective of this project is to compare MD5 & SHA-1 algorithm in data deduplication technique and to evaluate the MD5 & SHA-1 algorithm, length of message digest and speed using deduplication software. …”
Get full text
Get full text
Thesis -
2
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
Get full text
Get full text
Thesis -
3
Stereo matching algorithm using census transform and segment tree for depth estimation
Published 2023“…This article proposes an algorithm for stereo matching corresponding process that will be used in many applications such as augmented reality, autonomous vehicle navigation and surface reconstruction. …”
Get full text
Get full text
Get full text
Article -
4
Nomadic people optimizer (NPO) for large-scale optimization problems
Published 2019“…The NPO was tested and evaluated based on sixty unconstrained benchmark test functions. …”
Get full text
Get full text
Thesis -
5
Power System State Estimation In Large-Scale Networks
Published 2010“…The gain and the Jacobian matrices associated with the basic algorithm require large storage and have to be evaluated at every iteration, resulting in more computation time. …”
Get full text
Get full text
Thesis -
6
BMTutor research design: Malay sentence parse tree visualization
Published 2014“…As a result of the lack of models and algorithms have been introduced in both parsers, the model and algorithm development phase is introduced in the design of BMTutor.Output from the development process shows that the prototype is able to provide sentence correction for all 15 invalid sentences and can produce parse tree visualizations for all 20 sentences used for prototype testing.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Modeling and control of a Pico-satellite attitude using Fuzzy Logic Controller
Published 2010“…In this regards, a new method of Pico-satellite attitude control using Mamdani Fuzzy Logic Principles is introduced. …”
Get full text
Thesis -
8
Hybrid-discrete multi-objective particle swarm optimization for multi-objective job-shop scheduling
Published 2022“…This research first proposes an improved continuous MOPSO to address the rapid clustering problem that exists in the basic PSO algorithm using three improvement strategies: re-initialization of particles, systematic switch of best solutions and mutation on global best selection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Fingerprint Image Compression Using Wavelet Transform
Published 2003“…It means that there exists a large selection of wavelet families depending on choice of wavelet function. The objective of this study is to evaluate a variety of wavelet filters using Wavelet toolbox for selecting the best wavelet filters to be used in compress and decompress of selected fingerprint images. …”
Get full text
Get full text
Thesis -
10
-
11
CYCLOSTATIONARY FEATURES BASED LOW COMPLEXITY MUTLIRESOLUTION SPECTRUM SENSING FOR COGNITVE RADIO APPLICATIONS
Published 2011“…Both subjective and objective evaluation show that the proposed scheme is not only superior to the commonly used energy detection method but also to various multi-resolution sensing techniques as it relies on the robustness of cyclostationary feature detection. …”
Get full text
Get full text
Thesis -
12
Extention and cryptanalysis of golden cryptography
Published 2015“…Finally, the experimental results, using several images (Lena, Nike, Micky, and Damavand) and three measuring factors were evaluated. …”
Get full text
Get full text
Thesis -
13
Robust Kernel Density Function Estimation
Published 2010“…The classical kernel density function estimation approach is widely used in various formula and methods. …”
Get full text
Get full text
Thesis -
14
FEATURES EXTRACTION OF HEP-2 IMMUNOFLUORESCENCE PATTERNS BASED ON TEXTURE AND REGION OF INTEREST TECHNIQUES
Published 2013“…This project involves developing features extraction technique of HEp-2 cell of 2 main patterns namely Nucleolar and Centromere using texture and region of interest technique. Next, to design an algorithm that can automatically identify the 2 patterns of the HEp-2 cell tested using ANA. …”
Get full text
Get full text
Final Year Project -
15
Improving Extreme Programming Framework With Security Concerns For E-Commerce Applications
Published 2024thesis::doctoral thesis -
16
MM-PNEMO: a mathematical model to assess handoff delay and packet loss
Published 2019“…Moreover, the wireless nodes are typically small that results in resource-constrained. Thus, it is uphill to use algorithms having giant processing power or memory footprint. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Routing performance enhancement in hierarchical torus network by link-selection algorithm
Published 2005“…We evaluate the dynamic communication performance of an HTN using dimension-order routing and link-selection algorithms under various traffic patterns. …”
Get full text
Get full text
Get full text
Article -
18
Dynamic communication performance enhancement in hierarchical torus network by selection algorithm
Published 2012“…The dynamic communication performances of an HTN is evaluated by using dimension-order routing and proposed adaptive routing algorithms under various traffic patterns. …”
Get full text
Get full text
Get full text
Article -
19
Adaptive routing algorithms and implementation for TESH network
Published 2013“…It is found that the communication performance of a TESH network using these adaptive algorithms is better than when the dimension-order routing algorithm is used.…”
Get full text
Get full text
Get full text
Article -
20
Finding the root of nonlinear function using five bracketing method / Nur Afiqah Mohamed Azhar
Published 2019“…Therefore, numerical method in the form of bracketing method is often used to find only the approximate root of the function. …”
Get full text
Get full text
Thesis
