Search Results - (( based evaluation new algorithm ) OR ( based construction based algorithm ))*
Search alternatives:
- based construction »
- construction based »
- based evaluation »
- evaluation new »
- new algorithm »
-
1
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis -
2
-
3
-
4
Dynamic Bayesian networks and variable length genetic algorithm for designing cue-based model for dialogue act recognition
Published 2010“…It is also one of the most challenging problems as most often the dialogue act is not expressed directly in speaker's utterance. In this paper, a new cue-based model for dialogue act recognition is presented. …”
Get full text
Get full text
Article -
5
Non-fiducial based electrocardiogram biometrics with kernel methods
Published 2017“…The effectiveness of this algorithm is investigated by comparing with other AC based feature extraction algorithms involving AC/LDA (Linear Discriminant Analysis) and AC/PCA (Principal Component Analysis). …”
Get full text
Get full text
Thesis -
6
Optimization of Reservoir Operation using New Hybrid Algorithm
Published 2018“…In addition, based on a multi-criteria decision-making model, it was evaluated by comparing it with other evolutionary algorithms. …”
Get full text
Get full text
Article -
7
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
Published 2019“…Finally, to choose valid pseudo-random sequences from multistability regions, this thesis constructs a new algorithm based on a new 3D multi-attribute chaotic system exhibiting extreme multistability behaviors. …”
Get full text
Get full text
Thesis -
8
-
9
A DNA-Inspired Symmetric Lightweight Block Cipher With Strong Randomness Properties
Published 2026“…A comprehensive set of security evaluation methods has been employed to assess the cryptographic strength and performance of the new algorithm. …”
thesis::doctoral thesis -
10
Risk assessment for safety and health algorithm for building construction in Oman
Published 2015“…The general objective of this study is to carry out a Risk Assessment for Safety and Health (RASH) algorithm for building construction in Oman and to develop a calculation methodology to evaluate safety and health. …”
Get full text
Get full text
Thesis -
11
A combinatory algorithm of univariate and multivariate gene selection
Published 2009“…In this paper, we considered new parameters which come up from singular value decomposition and present a combination algorithm for gene selection to integrate the univariate and multivariate approaches and compare it with gene selection based on correlation coefficient with binary output classes to analyze the effect of new parameters. …”
Get full text
Get full text
Get full text
Article -
12
Enhancement Of Wifi Indoor Positioning System
Published 2011“…The need for an indoor positioning system that uses the existing infrastructure (WiFi) of a building and achieves a high accuracy positioning is therefore, required. In this research, a new algorithm named (WBI) is proposed, based on the WiFi Received Signal Strength (RSS) technology. …”
Get full text
Get full text
Thesis -
13
Cloud Worm Detection and Response Technique By Integrating The Enhanced Genetic Algorithm An Threat Level
Published 2024thesis::doctoral thesis -
14
An ensemble data summarization approach based on feature transformation to learning relational data
Published 2015“…A better cluster result can also be produced by combining the cluster results generated from the GA based clustering with Feature Selection and Feature Construction algorithms.…”
Get full text
Get full text
Get full text
Thesis -
15
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
16
A new multicast-based architecture to support host mobility in IPv6
Published 2003“…The mechanism is based on hash algorithm. This paper explains the construction of a dynamic delivery tree of the mobile node movement for a multicast-based mobile IPv6 network, such that the branches of the tree constitute the shortest paths from the packet source to each of the visited locations. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Opposition Based Competitive Grey Wolf Optimizer For EMG Feature Selection
Published 2020“…As for EMG feature selection, the proposed algorithms are evaluated using the EMG data acquired from the publicly access EMG database. …”
Get full text
Get full text
Get full text
Article -
18
Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed
Published 2017“…Case study evaluation was conducted based on three industrial open source case studies in order to evaluate empirically the significant of the performance of the proposed method. …”
Get full text
Get full text
Get full text
Thesis -
19
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…CBH shows that by grouping the nodes into clusters and having only one replica in each cluster, has minimized the number of replicas involved in constructing read and write quorums. This research has contributed a dynamic cluster-based hybrid replica control protocol which proposed a clustering algorithm to determine the number of clusters, a mechanism for dynamic participation of nodes in the network, and a replica placement algorithm that produces low communication cost and high data availability as compared to DH and DDG protocols. …”
Get full text
Get full text
Thesis -
20
Confidence intervals (CI) for concentration parameter in von Mises distribution and analysis of missing values for circular data / Siti Fatimah binti Hassan
Published 2015“…Several methods in constructing the CI for the concentration parameter are proposed including CI based on circular population, CI based on the asymptotic distribution of ˆ , CI based on the distribution of 휃 and 푅 and also CI based on bootstrap-t method. …”
Get full text
Get full text
Thesis
