Search Results - (( based evaluation between algorithm ) OR ( based instruction new algorithm ))*

Refine Results
  1. 1

    RISC-V instruction set extension on blockchain application by Cheong , Kin Seng

    Published 2024
    “…This project is an instruction set extension project based on RISC-V architecture for academic purpose. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2
  3. 3

    Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network by Abu-Khadrah, Ahmed Ismail Mohammad

    Published 2017
    “…This separation contributes in determining the effect of access point on the network performance as well as it allows in evaluating the algorithms that based on the differentiation between the access point and stations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Smart and energy aware routing for the internet of mobile things by Beh, Zi Xuan

    Published 2021
    “…This can also be concluded that the SEA routing algorithm is smart and energy aware based on the results obtained.…”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  5. 5

    Performance Evaluation of Vector Evaluated Gravitational Search Algorithms Based on ZDT Test Functions by Badaruddin, Muhammad, Zuwairie, Ibrahim, Kamarul Hawari, Ghazali, Mohd Riduwan, Ghazali, Kian, Sheng Lim, Sophan Wahyudi, Nawawi, Nor Azlina, Ab. Aziz, Marizan, Mubin, Norrima, Mokhtar

    Published 2014
    “…This paper presents a performance evaluation of Vector Evaluated Gravitational Search Algorithm (VEGSA), namely VEGSA-I and VEGSA-II algorithms, for multi-objective optimization problems. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Evaluation of Visual Network Algorithms on Historical Documents by Khairunnisa, Binti Ibrahim

    Published 2020
    “…The evaluation found that FA2 algorithm when combined with MC algorithm produce the best network representation for SAGA. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Evaluation of dynamic programming among the existing stereo matching algorithms by Teo, Chee Huat, Nurulfajar, Abd Manap

    Published 2015
    “…On this research is to perform an evaluation on the performance between the dynamic programming with other existing method as comparison. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Development of an Automated Technique for Reconstructing Jawi Characters in Historical Documents by Zulcaffle, Tengku Mohd Afendi

    Published 2007
    “…The results of the algorithms were mathematically evaluated using the Relative Foreground Area Error. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Optimizing Cloud Storage Costs: Introducing the Pre-Evaluation-Based Cost Optimization (PECSCO) Mechanism by Alomari M.F., Mahmoud M.A., Gharaei N., Rasool S.M., Hasan R.A.

    Published 2025
    “…The core of the algorithm utilizes a Genetic Algorithm (GA) to find the optimal position for the first evaluator by minimizing the total distance between this evaluator and all CCTV nodes, aiming for surveillance efficiency. …”
    Conference paper
  13. 13

    Vector Evaluated Gravitational Search Algorithm (VEGSA) for multi-objective optimization problems by Zuwairie, Ibrahim, Badaruddin, Muhammad, Kamarul Hawari, Ghazali, Lim, Kian Sheng, Sophan Wahyudi, Nawawi, Zulkifli, Md. Yusof

    Published 2012
    “…This paper presents a novel algorithm, which is based on Gravitational Search Algorithm (GSA), for multiobjective optimization problems. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Modified Contrast Limited Adaptive Histogram Equalization for high dynamic range images by Tung, Li Qian

    Published 2012
    “…For assessment, a subjective and an objective evaluation were conducted to evaluate the performance of the tone mapping algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Mismatch losses minimization in photovoltaic arrays by arranging modules applying a genetic algorithm by Shirzadi, Samad, Hizam, Hashim, Abdul Wahab, Noor Izzri

    Published 2014
    “…This work introduces a new method that employs genetic algorithm (GA) to find an arrangement of modules in an array which minimizes mismatch losses more effectively than conventional methods do. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Information Theoretic-based Feature Selection for Machine Learning by Muhammad Aliyu, Sulaiman

    Published 2018
    “…Thus, this thesis has developed and evaluated a filter based Information Theoretic-based Feature Selection (IFS) for machine learning. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Document clustering based on firefly algorithm by Mohammed, Athraa Jasim, Yusof, Yuhanis, Husni, Husniza

    Published 2015
    “…Document clustering is widely used in Information Retrieval however, existing clustering techniques suffer from local optima problem in determining the k number of clusters.Various efforts have been put to address such drawback and this includes the utilization of swarm-based algorithms such as particle swarm optimization and Ant Colony Optimization.This study explores the adaptation of another swarm algorithm which is the Firefly Algorithm (FA) in text clustering.We present two variants of FA; Weight- based Firefly Algorithm (WFA) and Weight-based Firefly Algorithm II (WFAII).The difference between the two algorithms is that the WFAII, includes a more restricted condition in determining members of a cluster.The proposed FA methods are later evaluated using the 20Newsgroups dataset.Experimental results on the quality of clustering between the two FA variants are presented and are later compared against the one produced by particle swarm optimization, K-means and the hybrid of FA and -K-means. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…Second, an improved steganographic algorithm based on the infamous Least Significant Bit (LSB) is proposed for hiding the sensed data scheduled for transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20