Search Results - (( _ evaluation a algorithm ) OR ( between transformational issues algorithm ))
Search alternatives:
- transformational issues »
- issues algorithm »
- evaluation a »
- a algorithm »
-
1
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
2
Denoising of digital images using second generation wavelet transforms-hidden markov model
Published 2016“…In this issue, a newly developed algorithm based on second-generation wavelet transformation using semi-soft thresholding is introduced. …”
Get full text
Get full text
Thesis -
3
The Development of Synthetic Algorithm of Fluid Flow Through Particle Image Velocimetry (PIV)
Published 2017“…The most common PIV cross-correlation algorithm, the standard Fast-Fourier Transform (FFT) is evaluated by measuring the displacement of particles in synthetically generated PIV images. …”
Get full text
Get full text
Final Year Project -
4
Data Transformation Model For Addressing Incomplete And Inconsistent Quality Issues Of Big Data
Published 2024“…A new algorithm using ontology and clustering methods is used to identify and correct incomplete and inconsistent data, which resolves the availability and comprehensiveness of data, similarity between data items, and missing specific attributes of data. …”
Get full text
Get full text
Get full text
Thesis -
5
Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali
Published 2024“…The hybrid method, IDBA-AFW, aims to enhance the original IDBA by incorporating the Adaptive Floyd-Warshall algorithm for graph transformation and optimization. …”
Get full text
Get full text
Get full text
Thesis -
6
Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs
Published 2017“…This thesis therefore proposes a framework to address these issues through a two-step approach involving region matching and region labeling. …”
Get full text
Get full text
Get full text
Thesis -
7
Multi-Agent cubature Kalman optimizer: A novel metaheuristic algorithm for solving numerical optimization problems
Published 2024“…Simulation results demonstrate that MACKO is superior, outperforming the benchmark algorithms, as indicated by Friedman's test with a 5 % significance level.…”
Get full text
Get full text
Get full text
Article -
8
Mobile data gathering algorithms for wireless sensor networks
Published 2014“…The performance evaluation of the proposed data gathering algorithms has been done through a detailed and extensive discrete-event-simulation analysis. …”
Get full text
Get full text
Thesis -
9
Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian
Published 2013“…As a comparative study, the performance of the algorithms was evaluated based on various standard metrics. …”
Get full text
Get full text
Thesis -
10
The classification of wink-based eeg signals by means of transfer learning models
Published 2021“…It was demonstrated from the simulation investigation that the CWT model could yield a better signal transformation amongst the preprocessing algorithms. …”
Get full text
Get full text
Thesis -
11
Sentiment Analysis of Sexual Harassment in Malaysia on Twitter Using Machine Learning Algorithms
Published 2023“…The data then underwent stages of data preparation such as data preprocessing and feature extraction to facilitate further data transformation. The transformed data is then modelled using machine learning algorithms such as Naïve Bayes classifier and Support Vector Machine to predict the overall sentiment of tweets, in which the finding depicted an overall positive sentiment surrounding the issue. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
12
Sales prediction for Adha Station by using predictive analytics
Published 2025“…This research presented a technique for projecting sales utilising current data through a machine learning algorithm. …”
Get full text
Get full text
Student Project -
13
-
14
Low-distortion MMSE speech enhancement estimator based on laplacian prior
Published 2017“…First, the observation signal is decorrelated through a real transform domain to obtain its transform coefficients. …”
Get full text
Get full text
Get full text
Article -
15
Image Encrytion Using Block Based Transformation Algorithm
Published 2008Get full text
Get full text
Get full text
Article -
16
Design Methodology and Analysis of Hash Function based-on Field Programmable Gate Array for Hash-based Message Authentication Code Application
Published 2025“…For this purpose, cryptography hash functions are selected as a design target. These algorithms have been studied to improve the speed, area implementation, and power consumption. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network
Published 2016“…To enhance the overall performance, this thesis also evaluates the uniqueness and the stability of ECG signal using Independent Component Analysis (ICA) and fast Fourier Transform (FFT) algorithm respectively as the signal is applied as inputs of the proposed ECG-based authentication protocol model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Performance evaluation of lightweight Crypto functions for Internet of things applications
Published 2020“…One of the main challenges in the IOT system is in the security and privacy of the generated data. The major issue in the design of a security system in IOT is in the device layer. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Electric vehicle smart charging coordination on a residential distribution grid / Norhasniza Md Razali, Hasmaini Mohamad and Zaipatimah Ali
Published 2023“…This study presents smart charging coordination of PEVs in a residential distribution network considering a daily residential load demand profile in Malaysia using a particle swarm optimization (PSO) algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Efficient reconfigurable architectures for 3-D medical image compression
Published 2010“…Despite their advantages, most 3-D medical imaging algorithms are computationally intensive with matrix transformation as the most fundamental operation involved in the transform-based methods. …”
Get full text
Get full text
Thesis
