Search Results - (( _ evaluation a algorithm ) OR ( between transformational issues algorithm ))

Refine Results
  1. 1
  2. 2

    Denoising of digital images using second generation wavelet transforms-hidden markov model by Khmag, Asem Ib Mohamed

    Published 2016
    “…In this issue, a newly developed algorithm based on second-generation wavelet transformation using semi-soft thresholding is introduced. …”
    Get full text
    Get full text
    Thesis
  3. 3

    The Development of Synthetic Algorithm of Fluid Flow Through Particle Image Velocimetry (PIV) by MOHD SHARFRI, RAIHAN AMALINA

    Published 2017
    “…The most common PIV cross-correlation algorithm, the standard Fast-Fourier Transform (FFT) is evaluated by measuring the displacement of particles in synthetically generated PIV images. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Data Transformation Model For Addressing Incomplete And Inconsistent Quality Issues Of Big Data by Onyeabor, Grace Amina

    Published 2024
    “…A new algorithm using ontology and clustering methods is used to identify and correct incomplete and inconsistent data, which resolves the availability and comprehensiveness of data, similarity between data items, and missing specific attributes of data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali by Ihsan , Ali

    Published 2024
    “…The hybrid method, IDBA-AFW, aims to enhance the original IDBA by incorporating the Adaptive Floyd-Warshall algorithm for graph transformation and optimization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs by Harandi, Bahareh Kalantar Ghorashi

    Published 2017
    “…This thesis therefore proposes a framework to address these issues through a two-step approach involving region matching and region labeling. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Multi-Agent cubature Kalman optimizer: A novel metaheuristic algorithm for solving numerical optimization problems by Zulkifli, Musa, Zuwairie, Ibrahim, Mohd Ibrahim, Shapiai

    Published 2024
    “…Simulation results demonstrate that MACKO is superior, outperforming the benchmark algorithms, as indicated by Friedman's test with a 5 % significance level.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Mobile data gathering algorithms for wireless sensor networks by Ghaleb, Mukhtar Mahmoud Yahya

    Published 2014
    “…The performance evaluation of the proposed data gathering algorithms has been done through a detailed and extensive discrete-event-simulation analysis. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian by Talebian, Seyed Hamid

    Published 2013
    “…As a comparative study, the performance of the algorithms was evaluated based on various standard metrics. …”
    Get full text
    Get full text
    Thesis
  10. 10

    The classification of wink-based eeg signals by means of transfer learning models by Jothi Letchumy, Mahendra Kumar

    Published 2021
    “…It was demonstrated from the simulation investigation that the CWT model could yield a better signal transformation amongst the preprocessing algorithms. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Sentiment Analysis of Sexual Harassment in Malaysia on Twitter Using Machine Learning Algorithms by Nurellezia, Suleiman

    Published 2023
    “…The data then underwent stages of data preparation such as data preprocessing and feature extraction to facilitate further data transformation. The transformed data is then modelled using machine learning algorithms such as Naïve Bayes classifier and Support Vector Machine to predict the overall sentiment of tweets, in which the finding depicted an overall positive sentiment surrounding the issue. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  12. 12

    Sales prediction for Adha Station by using predictive analytics by Mohd Mokhid, Muhammad Amier Latieff

    Published 2025
    “…This research presented a technique for projecting sales utilising current data through a machine learning algorithm. …”
    Get full text
    Get full text
    Student Project
  13. 13
  14. 14

    Low-distortion MMSE speech enhancement estimator based on laplacian prior by Mahmmod, Basheera M., Ramli, Abd Rahman, Abdulhussain, Sadiq H., Syed Mohamed, Syed Abdul Rahman Al-Haddad, A. Jassim, Wissam

    Published 2017
    “…First, the observation signal is decorrelated through a real transform domain to obtain its transform coefficients. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Design Methodology and Analysis of Hash Function based-on Field Programmable Gate Array for Hash-based Message Authentication Code Application by SHAMSIAH BINTI, SUHAILI

    Published 2025
    “…For this purpose, cryptography hash functions are selected as a design target. These algorithms have been studied to improve the speed, area implementation, and power consumption. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network by Ramli, Sofia Najwa

    Published 2016
    “…To enhance the overall performance, this thesis also evaluates the uniqueness and the stability of ECG signal using Independent Component Analysis (ICA) and fast Fourier Transform (FFT) algorithm respectively as the signal is applied as inputs of the proposed ECG-based authentication protocol model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Performance evaluation of lightweight Crypto functions for Internet of things applications by Jaleel, Nubila, Habaebi, Mohamed Hadi, Islam, Md Rafiqul

    Published 2020
    “…One of the main challenges in the IOT system is in the security and privacy of the generated data. The major issue in the design of a security system in IOT is in the device layer. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Electric vehicle smart charging coordination on a residential distribution grid / Norhasniza Md Razali, Hasmaini Mohamad and Zaipatimah Ali by Md Razali, Norhasniza, Mohamad, Hasmaini, Ali, Zaipatimah

    Published 2023
    “…This study presents smart charging coordination of PEVs in a residential distribution network considering a daily residential load demand profile in Malaysia using a particle swarm optimization (PSO) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Efficient reconfigurable architectures for 3-D medical image compression by Ahmad, Afandi

    Published 2010
    “…Despite their advantages, most 3-D medical imaging algorithms are computationally intensive with matrix transformation as the most fundamental operation involved in the transform-based methods. …”
    Get full text
    Get full text
    Thesis