Search Results - binary (((((both OR mat) algorithm) OR (_ algorithm))) OR (based algorithm))

Refine Results
  1. 1

    Multi-State Particle Swarm Optimization for Discrete Combinatorial Optimization Problem by Ismail, Ibrahim, Hamzah, Ahmad, Zuwairie, Ibrahim, Mohd Falfazli, Mat Jusof, Zulkifli, Md. Yusof, Sophan Wahyudi, Nawawi, Kamal, Khalil, Muhammad Arif, Abdul Rahim

    Published 2014
    “…The binary-based algorithms including the binary particle swarm optimization (BPSO) algorithm are proposed to solve discrete optimization problems. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Enhancing Wearable-Based Human Activity Recognition with Binary Nature-Inspired Optimization Algorithms for Feature Selection by Norfadzlan, Yusup, Izzatul Nabila, Sarbini, Dayang Nurfatimah, Awang Iskandar, Azlan, Mohd Zain, Didik Dwi, Prasetya

    Published 2026
    “…In the experiment, we conducted an evaluation of the effectiveness and efficiency of four nature-inspired binary algorithms for optimization namely Binary Particle Swarm Optimization (BPSO), Binary Grey Wolf Optimization algorithm (BGWO), Binary Differential Evolution algorithm (BDE), and Binary Salp Swarm algorithm (BSS) - in the context of human activity recognition (HAR). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    A performance analysis of association rule mining algorithms by Fageeri, S.O., Ahmad, R., Alhussian, H.

    Published 2016
    “…The results of the CPU profiler of Java VisualVM showed that Binary-Based algorithm performs better than Eclat algorithm in-terms of both execution times and memory usage. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Enhancement of {0, 1, 3}-NAF Recoding Algorithm using Block Method Technique for Elliptic Curve Cryptosystem by Bafandehkar, Mohsen

    Published 2015
    “…In order to clearly demonstrate the running time difference between the based and the proposed algorithm, both algorithms performance time are measured and compared. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Image pre-processing algorithm for Ficus deltoidea Jack (Moraceae) varietal recognition: a repeated perpendicular line scanning approach by Ahmad Fakhri, Ab. Nasir, M Nordin, A Rahman, Nashriyah, Mat, Abd Rasid, Mamat, Ahmad Shahrizan, Abdul Ghani

    Published 2018
    “…Some of researchers have developed the image pre-processing algorithm to remove petiole section. However, the algorithm was developed using semi-automatic algorithm which is strongly believed to give an inaccurate feature measurement. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Cryptanalysis of elliptic curve scalar multiplication algorithms by Leong, Zhen Hong

    Published 2025
    “…This project explores scalar multiplication algorithms in Elliptic Curve Cryptography, focusing on the binary method and elliptic net method applied in Elliptic Curve Diffie-Hellman and Elliptic Curve Digital Signature Algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Cryptanalysis of elliptic curve scalar multiplication algorithms by Leong, Zhen Hong

    Published 2025
    “…This project explores scalar multiplication algorithms in Elliptic Curve Cryptography, focusing on the binary method and elliptic net method applied in Elliptic Curve Diffie-Hellman and Elliptic Curve Digital Signature Algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    An efficient computation technique for cryptosystems based on Lucas functions by Md Ali, Zulkarnain, Othman, Mohamed, Md. Said, Mohamad Rushdan, Sulaiman, Md. Nasir

    Published 2008
    “…In this paper, we are presenting a new and efficient computations algorithm for LUC Cryptosystems. We have found that the binary sequence used in a new algorithm is shorter than a special sequence used in an existing algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    An Assembly Sequence Planning Approach with a Rule-based Multi-state Gravitational Search Algorithm by Ismail, Ibrahim, Zuwairie, Ibrahim, Hamzah, Ahmad, Mohd Falfazli, Mat Jusof, Zulkifli, Md. Yusof, Sophan Wahyudi, Nawawi, Marizan, Mubin

    Published 2015
    “…In this paper, an approach based on a new variant of the gravitational search algorithm (GSA) called the rule-based multi-state gravitational search algorithm (RBMSGSA) is used to solve the assembly sequence planning problem. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Cryptanalysis of elliptic curve scalar multiplication algorithms by Leong, Zhen Hong

    Published 2025
    “…This project explores scalar multiplication algorithms in Elliptic Curve Cryptography, focusing on the binary method and elliptic net method applied in Elliptic Curve Diffie-Hellman and Elliptic Curve Digital Signature Algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Angle Modulated Simulated Kalman Filter Algorithm for Combinatorial Optimization Problems by Zulkifli, Md. Yusof, Zuwairie, Ibrahim, Ismail, Ibrahim, Kamil Zakwan, Mohd Azmi, Nor Azlina, Ab. Aziz, Nor Hidayati, Abd. Aziz, Mohd Saberi, Mohamad

    Published 2016
    “…The performance of the proposed angle modulated SKF (AMSKF) is compared against two other discrete population-based optimization algorithms,namely, binary particle swarm optimization (BPSO) and binary gravitational search algorithm (BGSA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Logo recognition using Artificial Neural Network (ANN) / Nor Hamidah Abdul Ghafar by Abdul Ghafar, Nor Hamidah

    Published 2005
    “…The binary representation was used for the input node of neural network for back propagation training algorithm. …”
    Get full text
    Get full text
    Student Project
  14. 14

    Binary search algorithm as maximum power tracking technique for photovoltaic system under partial shaded conditions by Meng Chung, Tiong, Hamdan, Daniyal, Mohd Herwan, Sulaiman, Mohd Shafie, Bakar

    Published 2018
    “…Both algorithms were simulated under ten different test cases of partial shading conditions to study the accuracy, speed and tracking efficiency. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    A log file analysis technique using binary-based approach by Fageeri, S.O., Ahmad, R., Baharudin, B.

    Published 2014
    “…To validate the approach, performance comparison was also done against the popular Apriori algorithm. Initial result has shown enhancement in terms of execution time using the binary-based approach. …”
    Get full text
    Get full text
    Article
  16. 16

    Eye closure and open detection using Adaptive Thresholding Histogram Enhancement (ATHE) technique and connected components utilisation by Mat Ibrahim, Masrullizam, Awang Md Isa, Azmi, Darsono, Abd Majid

    Published 2014
    “…Eye closure detection is an important operation prior to carry out the main algorithm such as iris recognition algorithms, and eye tracking algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    An alternative approach to normal parameter reduction algorithms for decision making using a soft set theory / Sani Danjuma by Sani , Danjuma

    Published 2017
    “…Finally, to evaluate the proposed algorithm, thorough experimentation on both real life and synthetic binary-valued data set were performed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    A Modified Gravitational Search Algorithm for Discrete Optimization Problem by Zuwairie, Ibrahim, Zulkifli, Md. Yusof, Shahdan, Sudin, Sophan Wahyudi, Nawawi, Amar Faiz, Zainal Abidin, Muhammad Arif, Abdul Rahim, Kamal, Khalil

    Published 2014
    “…The experimental result shows that the FDGSA able to find better solutions and converges faster compared to the Binary Gravitational Search Algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    NARX modelling for steam distillation pilot plant using binary particle swarm optimisation technique / Najidah Hambali by Hambali, Najidah

    Published 2019
    “…The proposed NARX-based BPSO algorithm was implemented for both time-varying water and steam temperature from the SDPP. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Key generation technique based on triangular coordinate extraction for hybrid cubes by Mushtaq, Muhammad Faheem, Jamel, Sapiee, Mohamad, Kamaruddin Malik, Ahmad Khalid, Shamsul Kamal, Mat Deris, Mustafa

    Published 2017
    “…The generation of Hybrid Cubes (HC) based on permutation and combination of integer numbers are utilized in the construction of encryption and decryption key in the non-binary block cipher. …”
    Get full text
    Get full text
    Article