Search Results - (( _ location modified algorithm ) OR ( based application new algorithm ))*
Search alternatives:
- location modified »
- based application »
- application new »
- new algorithm »
-
1
Performance Enhancement Of Artificial Bee Colony Optimization Algorithm
Published 2013“…To overcome the problems, this research work has proposed few modified and new ABC variants; Gbest Influenced-Random ABC (GRABC) algorithm systematically exploits two different mutation equations for appropriate exploration and exploitation of search-space, Multiple Gbest-guided ABC (MBABC) algorithm enhances the capability of locating global optimum by exploiting so-far-found multiple best regions of a search-space, Enhanced ABC (EABC) algorithm speeds up exploration for optimal-solutions based on the best so-far-found region of a search-space and Enhanced Probability-Selection ABC (EPS-ABC) algorithm, a modified version of the Probability-Selection ABC algorithm, simultaneously capitalizes on three different mutation equations for determining the global-optimum. …”
Get full text
Get full text
Thesis -
2
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. …”
Get full text
Get full text
Thesis -
3
Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong
Published 2018“…The computational results also show that the algorithms of population based ACO performs better than the algorithms of non-population based ACO. …”
Get full text
Get full text
Get full text
Thesis -
4
Modifying maximum likelihood test for solving singularity and outlier problems in high dimensional cases
Published 2021“…The performance of MLѡвсн and four more modified ML-tests, namely MLtests with banded Cholesky estimator MLвсн with Thresholding MLтн with Weiszfeld Algorithm MLѡ and with Weiszfeld’s Algorithm Estimator and Thresholding MLѡтн had been examined using Type I error and power of test values in a simulation study. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
A modified reweighted fast consistent and high-breakdown estimator for high-dimensional datasets
Published 2024“…The basic idea of our proposed method is to modify the Mahalanobis distance so that it uses only the diagonal elements of the scatter matrix in the computation of the RFCH algorithm. …”
Get full text
Get full text
Get full text
Article -
6
Novel hybrid maximum power point tracking algorithm for PV systems under partially shaded conditions
Published 2015Get full text
Get full text
Conference or Workshop Item -
7
A Modified Route Discovery Approach For Dynamic Source Routing (DSR) Protocol In Mobile Ad-Hoc Networks
Published 2017“…Hence, a new mechanism in route discovery stage and in caching the routes in DSR algorithm according to the node's location in the network and the direction of the broadcast is proposed for better performance especially in terms of delay as well as redundant packets rate. …”
Get full text
Get full text
Get full text
Article -
8
Multi-objective Binary Clonal Selection Algorithm In The Retrieval Phase Of Discrete Hopfield Neural Network With Weighted Systematic Satisfiability
Published 2024“…The newly proposed logical rule and the algorithm will be the components in the logic mining model namely Weighted Systematic 2 Satisfiability Modified Reverse Analysis. …”
Get full text
Get full text
Thesis -
9
Reduced latency in restricted flooding routing protocol for mobile ad hoc network.
Published 2007“…This paper presents Quadrant-based directional routing protocol (Q-DIR) algorithm that restrict the broadcast region to a quadrant where the destination node and source node are located. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources
Published 2008“…First we propose two algorithms to improve the handoff process in AMTree protocol. …”
Get full text
Get full text
Thesis -
11
Enhanced Steganography Framework Based On Lossless Compression And Histogram
Published 2024“…The compression model was modified to include a hybrid lossless text compression algorithm to reduce redundant secret information and boost embedding capacity. …”
Get full text
Get full text
Thesis -
12
Adaptive impedance control for unknown non-flat environment
Published 2013“…This paper presents a new adaptive impedance control strategy, based on Function Approximation Technique (FAT) to compensate for unknown non-flat environment shape or time-varying environment location. The target impedance in the force controllable direction is modified by incorporating adaptive compensators and the uncertainties are represented by FAT, allowing the update law to be derived easily. …”
Get full text
Get full text
Get full text
Article -
13
Computational intelligence based power tracing for non discriminatory losses charge allocation and voltage stability improvement / Zulkiffli Abdul Hamid
Published 2013“…Subsequently, the developed tracing algorithm was modified in the context of stability index tracing. …”
Get full text
Get full text
Thesis -
14
Computational intelligence based power tracing for non discriminatory losses charge allocation and voltage stability improvement / Zulkiffli Abdul Hamid
Published 2013“…Subsequently, the developed tracing algorithm was modified in the context of stability index tracing. …”
Get full text
Get full text
Thesis -
15
-
16
Modified hybrid median filter for removal of low density random-valued impulse noise in images / Dr. Siti Noraini Sulaiman ... [et al.]
Published 2017“…Therefore, this project is intended to address the conflicting issue through formulating new RVIN removal algorithm based on two phase iterative method; adaptive-switching filtering methodology and local preserving scheme. …”
Get full text
Get full text
Research Reports -
17
Image watermarking optimization algorithms in transform domains and feature regions
Published 2012“…As a result,it will first introduce the theories about the feature extraction and the basic principles on how feature points can act as locating resynchronization between watermark insertion and extraction discussed in detail.Subsequently,it will present several content-based watermark embedding and extraction methods which can be directly implemented based on the synchronization scheme.Further detailed watermarking schemes which combine feature regions extraction with counter propagation neural network-based watermarks synapses memorization are then presented.The performance of watermarking schemes based on framework of feature point shows the following advantages:a)Good imperceptibility. …”
Get full text
Get full text
Thesis -
18
Modified damage location indices in beam-like structure: Analytical study
Published 2011“…The modified algorithms are able to detect the damage wherever its location, applying even to cases of multi damage locations. …”
Get full text
Get full text
Article -
19
Robust Kernel Density Function Estimation
Published 2010“…The efficiency of the modified mutual information estimate is evaluated based on its accuracy. …”
Get full text
Get full text
Thesis -
20
FACE CLASSIFICATION FOR AUTHENTICATION APPROACH BY USING WAVELET TRANSFORM AND STATISTICAL FEATURES SELECTION
Published 2011“…In the last method, the Modified K-Means Algorithm was used to remove the non-face regions in the input image. …”
Get full text
Get full text
Thesis
