Search Results - (( based estimation methods algorithm ) OR ( related information security algorithm ))*

Refine Results
  1. 1

    Semiparametric inference procedure for the accelarated failure time model with interval-censored data by Karimi, Mostafa

    Published 2019
    “…The rank-based methods, estimating algorithms, and resampling techniques that are developed do not involve the difficulties of the existing estimating procedures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming by Hussien, Hassan Mansur, Md Yasin, Sharifah, Muda, Zaiton, Udzir, Nur Izura

    Published 2019
    “…Block cipher algorithms become an essential domain in Information Technology (IT) due to ever increasing the number of attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence by S. S. S. , Ranjit

    Published 2011
    “…There are several block-matching algorithm based on block-based motion estimation techniques have been developed. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  5. 5

    An improved scatter search algorithm for parameter estimation in large-scale kinetic models of biochemical systems by Remli, Muhammad Akmal, Mohamad, Mohd Saberi, Deris, Safaai, Sinnott, Richard, Napis, Suhaimi

    Published 2019
    “…The improved algorithm is based on hybridization of quasi opposition-based learning in enhanced scatter search (QOBLESS) method. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Implementation of a modified incremental conductance MPPT algorithm with direct control based on a fuzzy duty cycle change estimator using dSPACE by Radjai, T., Rahmani, L., Mekhilef, Saad, Gaubert, J.P.

    Published 2014
    “…To eliminate all of the disadvantages of the classic IC algorithm, we developed a new IC controller based on a fuzzy duty cycle change estimator with direct control. …”
    Get full text
    Article
  8. 8

    Dynamic S-boxes and spiral permutation function on Fibonacci sequence for secure block cipher / Kamsiah Mohamed by Mohamed, Kamsiah

    Published 2022
    “…Cryptography requires a secure technique to ensure that the enemy is prevented while securing legitimate users gaining access to information. …”
    Get full text
    Get full text
    Thesis
  9. 9

    LEMABE: a novel framework to Improve analogy-based software cost estimation using learnable evolution model by Dashti, Maedeh, Gandoman, Taghi Javdani, Adeh, Dariush Hasanpoor, Zulzalil, Hazura, Md Sultan, Abu Bakar

    Published 2021
    “…Then, MMRE, PRED (0.25), and MdMRE criteria have been used to evaluate and compare the proposed method against other evolutionary algorithms. Employing the proposed method showed considerable improvement in estimating software cost estimation.…”
    Get full text
    Get full text
    Article
  10. 10

    An Improved Scatter Search Algorithm for Parameter Estimation in Large-Scale Kinetic Models of Biochemical Systems by Muhammad Akmal, Remli, Mohd Saberi, Mohamad, Safaai, Deris, Sinnott, Richard O., Suhaimi, Napis

    Published 2019
    “…Based on the results, the QOBLESS method can be used as an efficient parameter estimation method in large-scale kinetic model building.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    State estimation of the power system using robust estimator by Khan, Z., Razali, R.B., Daud, H., Nor, N.M., Firuzabad, M.F.

    Published 2016
    “…In this study, a new robust algorithm based on the quasi weighted least squares (QWLS) estimator is presented. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Improvement Of Local-Based Stereo Vision Disparity Map Estimation Algorithm by Hamzah, Rostam Affendi

    Published 2017
    “…Firstly, the proposed SVDM algorithm combines three matching cost features based on per pixel differences. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Multiple equations model selection algorithm with iterative estimation method by Kamarudin, Nur Azulia, Ismail, Suzilah

    Published 2016
    “…This estimation method is equivalent to maximum likelihood estimation at convergence. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    A new 128-bit block cipher by Mohd Ali, Fakariah Hani

    Published 2009
    “…The existence of this new 128-bit block cipher algorithm will increase the protection of the national information infrastructure and also will contribute as an alternative to other cryptographic algorithms in security in the computing industry.…”
    Get full text
    Get full text
    Thesis
  16. 16

    Pose estimation algorithm for mobile Augmented Reality based on inertial sensor fusion by Alam, Mir Suhail, Morshidi, Malik Arman, Gunawan, Teddy Surya, Olanrewaju, Rashidah Funke, Arifin, Fatchul

    Published 2021
    “…After extensive experiments, the validity of the proposed method was superior to the existing vision-based pose estimation algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Variable block based motion estimation using hexagon diamond full search algorithm (HDFSA) via block subtraction technique by Hardev Singh, Jitvinder Dev Singh

    Published 2015
    “…There are many types of motion estimation method but the most used method is the block matching method which is the fixed block matching and the variable block matching. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    A new algorithm to estimate attenuation using frequency shift methods by Maman Hermana, Hammad Hazim Mohd Azhar, Zuhar Zahir Tuan Harith

    Published 2012
    “…This paper presents the improvement of quality factor (Q) estimation using shift frequency method. A new method was developed based on two previous methods; peak frequency shift (PFS) method and centroid frequency shift (CFS) method. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Dynamic robust bootstrap method based on LTS estimators by Midi, Habshah, Uraibi, Hassan Sami, Al-Talib, Bashar Abdul Aziz Majeed

    Published 2009
    “…We call this method Dynamic Robust Bootstrap-LTS based (DRBLTS) because here we have employed the LTS estimator in the modified bootstrap algorithm. …”
    Get full text
    Get full text
    Article
  20. 20

    Algorithms based on spider daddy long legs for finding the optimal route in securing mobile ad hoc networks by Ghathwan, Khalil Ibrahim

    Published 2016
    “…The mechanism is developed to find the shortest secure path and to reduce overhead using the information that is available in the routing tables as an input to propose a more complex nature-inspired algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis