Search Results - (( using functional method algorithm ) OR ( basic evaluation method algorithm ))
Search alternatives:
- functional method »
- evaluation method »
- using functional »
- method algorithm »
- basic evaluation »
-
1
Data depublication using : Hashing algorithm / Naimah Nayan
Published 2019“…The objective of this project is to compare MD5 & SHA-1 algorithm in data deduplication technique and to evaluate the MD5 & SHA-1 algorithm, length of message digest and speed using deduplication software. …”
Get full text
Get full text
Thesis -
2
Online food ordering application using Boyer-Moore algorithm / Muhammad Zulhilmie Dzulkifli
Published 2021“…The main goal of this study is to create an online food ordering app using the corresponding Boyer-Moore string matching algorithm. …”
Get full text
Get full text
Thesis -
3
Nomadic people optimizer (NPO) for large-scale optimization problems
Published 2019“…The NPO was tested and evaluated based on sixty unconstrained benchmark test functions. …”
Get full text
Get full text
Thesis -
4
Stereo matching algorithm using census transform and segment tree for depth estimation
Published 2023“…Basically, the proposed framework in this article is developed through a series of functions. …”
Get full text
Get full text
Get full text
Article -
5
Power System State Estimation In Large-Scale Networks
Published 2010“…The gain and the Jacobian matrices associated with the basic algorithm require large storage and have to be evaluated at every iteration, resulting in more computation time. …”
Get full text
Get full text
Thesis -
6
BMTutor research design: Malay sentence parse tree visualization
Published 2014“…This paper discusses the research design for BMTutor.BMTutor is a prototype for visualizing Malay sentences that is combined with sentence checker, sentence correction and word attribute components.The purpose of BMTutor is to check sentence validation, provide sentence correction for invalid sentence used and produce parse tree visualization.The research design involved can be divided into four phases; categorizing sentence and produce repository (Phase1), developing models and algorithms (Phase 2); development of a prototype (Phase 3); and prototype testing (Phase 4).To date, this system is the only one designed with the functions and characteristics as in BMTutor.There are two BM parsers to check the validity of simple BM sentences had been developed.Both parsers performed three phases in research design, namely 1) the collection of sentence or CFG, 2) develop a prototype, and 3) conduct evaluation.The phases involved are the basic method in developing a prototype. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Modeling and control of a Pico-satellite attitude using Fuzzy Logic Controller
Published 2010“…In this regards, a new method of Pico-satellite attitude control using Mamdani Fuzzy Logic Principles is introduced. …”
Get full text
Thesis -
8
Improving Attentive Sequence-to-Sequence Generative-Based Chatbot Model Using Deep Neural Network Approach
Published 2022“…The strategies applied showed that the final accuracy obtained through the training after implementing a modification in the algorithm is at 81% accuracy rate compared to the basic model that recorded its final accuracy at 79% accuracy rate. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Hybrid-discrete multi-objective particle swarm optimization for multi-objective job-shop scheduling
Published 2022“…This research first proposes an improved continuous MOPSO to address the rapid clustering problem that exists in the basic PSO algorithm using three improvement strategies: re-initialization of particles, systematic switch of best solutions and mutation on global best selection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Robust Kernel Density Function Estimation
Published 2010“…The classical kernel density function estimation approach is widely used in various formula and methods. …”
Get full text
Get full text
Thesis -
11
Fingerprint Image Compression Using Wavelet Transform
Published 2003“…In fact, wavelet refers to a set of basic function, which is recursively defined form, a set of scaling coefficients and scaling function. …”
Get full text
Get full text
Thesis -
12
Extention and cryptanalysis of golden cryptography
Published 2015“…Finally, the experimental results, using several images (Lena, Nike, Micky, and Damavand) and three measuring factors were evaluated. …”
Get full text
Get full text
Thesis -
13
CYCLOSTATIONARY FEATURES BASED LOW COMPLEXITY MUTLIRESOLUTION SPECTRUM SENSING FOR COGNITVE RADIO APPLICATIONS
Published 2011“…Both subjective and objective evaluation show that the proposed scheme is not only superior to the commonly used energy detection method but also to various multi-resolution sensing techniques as it relies on the robustness of cyclostationary feature detection. …”
Get full text
Get full text
Thesis -
14
Improving Extreme Programming Framework With Security Concerns For E-Commerce Applications
Published 2024thesis::doctoral thesis -
15
FEATURES EXTRACTION OF HEP-2 IMMUNOFLUORESCENCE PATTERNS BASED ON TEXTURE AND REGION OF INTEREST TECHNIQUES
Published 2013“…Image segmentation will be done after pre-processing completed to further enhance the image according to its edge or region to be used for the input image. Different methods of features extraction will be used and compared for better outcome. …”
Get full text
Get full text
Final Year Project -
16
Development Of Double Stage Filter (DSF) On Stereo Matching Algorithm For 3D Computer Vision Applications
Published 2016“…Based on the results of evaluations, the results obtained by DSF is better than the algorithms, basic block matching and dynamic programming.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
MM-PNEMO: a mathematical model to assess handoff delay and packet loss
Published 2019“…Moreover, the wireless nodes are typically small that results in resource-constrained. Thus, it is uphill to use algorithms having giant processing power or memory footprint. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Finding the root of nonlinear function using five bracketing method / Nur Afiqah Mohamed Azhar
Published 2019“…Therefore, numerical method in the form of bracketing method is often used to find only the approximate root of the function. …”
Get full text
Get full text
Thesis -
19
Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus
Published 2003“…Voltage stability margin (VSM) can be basically identified by the multi-solution load flow calculation method. …”
Get full text
Get full text
Thesis -
20
Gravitational search – bat algorithm for solving single and bi-objective of non-linear functions
Published 2018“…The second technique is to solve bi-objective functions by using the BOBAT algorithm. The third technique is an integration of BOGSA with BOBAT to produce a BOGSBAT algorithm. …”
Get full text
Get full text
Thesis
