Search Results - (( _ location modified algorithm ) OR ( based application new algorithm ))*

Refine Results
  1. 1

    Performance Enhancement Of Artificial Bee Colony Optimization Algorithm by Abro, Abdul Ghani

    Published 2013
    “…To overcome the problems, this research work has proposed few modified and new ABC variants; Gbest Influenced-Random ABC (GRABC) algorithm systematically exploits two different mutation equations for appropriate exploration and exploitation of search-space, Multiple Gbest-guided ABC (MBABC) algorithm enhances the capability of locating global optimum by exploiting so-far-found multiple best regions of a search-space, Enhanced ABC (EABC) algorithm speeds up exploration for optimal-solutions based on the best so-far-found region of a search-space and Enhanced Probability-Selection ABC (EPS-ABC) algorithm, a modified version of the Probability-Selection ABC algorithm, simultaneously capitalizes on three different mutation equations for determining the global-optimum. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong by Lily , Wong

    Published 2018
    “…The computational results also show that the algorithms of population based ACO performs better than the algorithms of non-population based ACO. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Modifying maximum likelihood test for solving singularity and outlier problems in high dimensional cases by Hafeez, Ahmad

    Published 2021
    “…The performance of MLѡвсн and four more modified ML-tests, namely MLtests with banded Cholesky estimator MLвсн with Thresholding MLтн with Weiszfeld Algorithm MLѡ and with Weiszfeld’s Algorithm Estimator and Thresholding MLѡтн had been examined using Type I error and power of test values in a simulation study. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A modified reweighted fast consistent and high-breakdown estimator for high-dimensional datasets by A. Baba, Ishaq, Midi, Habshah, June, Leong W., Ibragimov, Gafurjan

    Published 2024
    “…The basic idea of our proposed method is to modify the Mahalanobis distance so that it uses only the diagonal elements of the scatter matrix in the computation of the RFCH algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    A Modified Route Discovery Approach For Dynamic Source Routing (DSR) Protocol In Mobile Ad-Hoc Networks by Allahham, Alaa Azmi, Mohammed, Muamer N.

    Published 2017
    “…Hence, a new mechanism in route discovery stage and in caching the routes in DSR algorithm according to the node's location in the network and the direction of the broadcast is proposed for better performance especially in terms of delay as well as redundant packets rate. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Multi-objective Binary Clonal Selection Algorithm In The Retrieval Phase Of Discrete Hopfield Neural Network With Weighted Systematic Satisfiability by Romli, Nurul Atiqah

    Published 2024
    “…The newly proposed logical rule and the algorithm will be the components in the logic mining model namely Weighted Systematic 2 Satisfiability Modified Reverse Analysis. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Reduced latency in restricted flooding routing protocol for mobile ad hoc network. by A. Latif, Liza, Ali, A., Fisal, Norsheila

    Published 2007
    “…This paper presents Quadrant-based directional routing protocol (Q-DIR) algorithm that restrict the broadcast region to a quadrant where the destination node and source node are located. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources by Al‐Sharafi, Ali Mohammed Ali

    Published 2008
    “…First we propose two algorithms to improve the handoff process in AMTree protocol. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Enhanced Steganography Framework Based On Lossless Compression And Histogram by Kasasbeh, Dima Suliman Mohammad

    Published 2024
    “…The compression model was modified to include a hybrid lossless text compression algorithm to reduce redundant secret information and boost embedding capacity. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Adaptive impedance control for unknown non-flat environment by Zainul Azlan, Norsinnira, Yamaura, Hiroshi

    Published 2013
    “…This paper presents a new adaptive impedance control strategy, based on Function Approximation Technique (FAT) to compensate for unknown non-flat environment shape or time-varying environment location. The target impedance in the force controllable direction is modified by incorporating adaptive compensators and the uncertainties are represented by FAT, allowing the update law to be derived easily. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15
  16. 16

    Modified hybrid median filter for removal of low density random-valued impulse noise in images / Dr. Siti Noraini Sulaiman ... [et al.] by Sulaiman, Siti Noraini, Isa, Iza Sazanita, Hussain, Zakaria, Md Tahir, Nooritawati, Mat Isa, Nor Ashidi

    Published 2017
    “…Therefore, this project is intended to address the conflicting issue through formulating new RVIN removal algorithm based on two phase iterative method; adaptive-switching filtering methodology and local preserving scheme. …”
    Get full text
    Get full text
    Research Reports
  17. 17

    Image watermarking optimization algorithms in transform domains and feature regions by Tao, Hai

    Published 2012
    “…As a result,it will first introduce the theories about the feature extraction and the basic principles on how feature points can act as locating resynchronization between watermark insertion and extraction discussed in detail.Subsequently,it will present several content-based watermark embedding and extraction methods which can be directly implemented based on the synchronization scheme.Further detailed watermarking schemes which combine feature regions extraction with counter propagation neural network-based watermarks synapses memorization are then presented.The performance of watermarking schemes based on framework of feature point shows the following advantages:a)Good imperceptibility. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Modified damage location indices in beam-like structure: Analytical study by Fayyadh, M.M., Razak, H.A.

    Published 2011
    “…The modified algorithms are able to detect the damage wherever its location, applying even to cases of multi damage locations. …”
    Get full text
    Get full text
    Article
  19. 19

    Robust Kernel Density Function Estimation by Dadkhah, Kourosh

    Published 2010
    “…The efficiency of the modified mutual information estimate is evaluated based on its accuracy. …”
    Get full text
    Get full text
    Thesis
  20. 20

    FACE CLASSIFICATION FOR AUTHENTICATION APPROACH BY USING WAVELET TRANSFORM AND STATISTICAL FEATURES SELECTION by DAWOUD JADALAH, NADIR NOURAIN

    Published 2011
    “…In the last method, the Modified K-Means Algorithm was used to remove the non-face regions in the input image. …”
    Get full text
    Get full text
    Thesis