Search Results - (( _ applications modified algorithm ) OR ( its application need algorithm ))*

Refine Results
  1. 1

    Modifying iEclat algorithm for infrequent patterns mining by Julaily Aida, J., Mustafa, M.

    Published 2018
    “…Pattern ruining has been extensively studied in research due to its successful application in several data mining scenarios. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Thesis
  4. 4

    Modifying iEclat algo ithm for infrequent patterns mining by Julaily Aida, Jusoh, Mustafa, Man

    Published 2018
    “…Pattern ruining has been extensively studied in research due to its successful application in several data mining scenarios. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique by Hamid, Nurul 'Atiqah

    Published 2016
    “…Up until today, video compression algorithm has been applied in various video applications ranging from video conferencing to video telephony. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Solar photovoltaic system based on perturb and observe maximum power point tracking with trapezoidal rule approach under partial shading conditions by Altwallbah, Neda Mahmod Mohammad.

    Published 2022
    “…Among all proposed algorithms, perturb and observe (P&O) algorithm is the most popular due to its simplicity and good convergence. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…This research aim is to study the performance of an improvised Genetic Algorithm (GA) by formulating its problem-specific algorithm for network intrusion problem. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A multi-objective particle swarm optimization algorithm based on dynamic boundary search for constrained optimization by Mohd Zain, Mohamad Zihin, Kanesan, Jeevan, Chuah, Joon Huang, Dhanapal, Saroja, Kendall, Graham

    Published 2018
    “…Hence, more difficult benchmark problems must be utilized to validate new algorithms performance. A well-known optimizer, Multi-Objective Particle Swarm Optimizer (MOPSO), has a few weakness that needs to be addressed, specifically its convergence in high dimensional problems and its constraints handling capability. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector by Abdulkader, Zaid A.

    Published 2018
    “…Since AODV has no security mechanisms, malicious nodes can perform many attacks just by not behaving according to the AODV rules, so that our framework can provide secure communication in VANET via modifying AODV. Our framework categorises the requirements for the VANET protection design via modifying AODV into three: Insure the Availability of VANET and its Services Algorithm (IAVSA), Protect Data Dissemination Algorithm (PDDA), and Secure Vehicles Authentication Algorithm (SVAA). …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Improvement of fuzzy neural network using mine blast algorithm for classification of Malaysian Small Medium Enterprises based on strength by Hussain Talpur, Kashif

    Published 2015
    “…Mine Blast Algorithm (MBA) which has been improved by Improved MBA (IMBA) can be further improved by modifying its exploitation phase. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Assist-as-needed control strategy for upper-limb rehabilitation based on subject’s functional ability by Ahmed Mounis, Shawgi Younis, Zainul Azlan, Norsinnira, Sado, Fatai

    Published 2019
    “…Our baseline controller is an adaptive inertia-related controller, which is integrated with the functional ability index algorithm to provide movement assistance as when needed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article