Search Results - (( course evaluation poe algorithm ) OR ( between transformational system algorithm ))

Refine Results
  1. 1

    Artificial neural networks and genetic algorithm for transformer winding/insulation faults by K.S.R., Rao, K.N., Nashruladin

    Published 2008
    “…The results are compared between the real and predicted faults to observe the accuracy rate of the system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2
  3. 3

    Transformer T-joint optimization using particle swarm optimization and hemisphere-shape design of the core by Yehya, Omar Sharaf Al-Deen

    Published 2017
    “…The electrical power engineering and transformer experts seek to achieve the best economic and practical operation of electrical power system transformers, which include minimizing losses that are generated inside the transformers. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Black hole algorithm along edge detector and circular hough transform based iris projection with biometric identification systems by Tara Othman Qadir, Tara Othman Qadir, N.S.A.M Taujuddin, N.S.A.M Taujuddin

    Published 2024
    “…In this study, we presented a Black Hole Algorithm (BHA) along the Canny edge detector and circular Hough transform-based optimization technique for circular parameter identification of iris segmentation. …”
    Get full text
    Get full text
    Article
  5. 5

    APPLICATION OF ANN AND GA FOR TRANSFORMER WINDING/ INSULATION FAULTS by NASHRULADIN, KHAIRUN NISA'

    Published 2007
    “…The project outcome is analyzed using Neural Network and Genetic Algorithm MATLAB Toolbox. Comparison between the real fault and predicted fault is made as to observe the accuracy rate of the system. …”
    Get full text
    Get full text
    Final Year Project
  6. 6
  7. 7
  8. 8

    An FPGA implementation and performance analysis between radix-2 and radix-4 of 4096 point FFT by Abbas, Zaid Ali, Sulaiman, Nasri, Md Yunus, Nurul Amziah, Wan Hasan, Wan Zuha, Ahmed, Mohammed K.

    Published 2018
    “…The main block in any OFDM transceiver is the Fast Fourier Transform (FFT). FFT consider the transformation bridge between the time and frequency domains. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Correlation immunity and resiliency of boolean functions from haar domain perspective by Rafiq, Hashum M., Siddiqi, Mohammad Umar

    Published 2015
    “…The paper exploits the analogy between the two transforms to derive the Haar general representation of the correlation-immunity and the resiliency security criteria. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Analysis Of Sift And Surf Algorithms For Image Mosaicing On Embedded Platform by Ooi , Chong Wei

    Published 2015
    “…Next homography estimation is performed by using RANSAC algorithm. Perspective transform is applied to obtain a transformation for mapping a two dimensional quadrilateral into another. …”
    Get full text
    Get full text
    Thesis
  12. 12

    COMPUTER AIDED SYSTEM FOR BREAST CANCER DIAGNOSIS USING CURVELET TRANSFORM by MOHAMED ELTOUKHY, MOHAMED MESELHY

    Published 2011
    “…In this thesis we developed a computer aided system for the diagnosis and detection of breast cancer using curvelet transform. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Verification of correctness properties for aggregation behavior of swarm robotics system using spin model checker / Siti Shafinaz Ali by Ali, Siti Shafinaz

    Published 2015
    “…This algorithm is based on PFSA only relies on local interactions between individuals, the extensibility of the algorithm is very weak. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Verification correctness properties for aggregation behavior of swarm robotics system using SPIN model checker / Siti Shafinaz Ali by Ali, Siti Shafinaz

    Published 2015
    “…This algorithm is based on PFSA only relies on local interactions between individuals, the extensibility of the algorithm is very weak. …”
    Get full text
    Get full text
    Thesis
  15. 15

    The haar analysis of nonlinearity cryptographic security criterion by Rafiq, Hashum M., Siddiqi, Mohammad Umar

    Published 2016
    “…This paper presents an analysis of the nonlinearity criterion from the Haar transform domain perspective. The paper proceeds by utilizing the connection between the Haar and the Walsh transforms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Model predictive control of bidirectional isolated DC–DC converter for energy conversion system by Akter, P., Uddin, M., Mekhilef, Saad, Tan, N.M.L., Akagi, H.

    Published 2015
    “…Model predictive control (MPC) is a powerful and emerging control algorithm in the field of power converters and energy conversion systems. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Eccentricity Optimization of NGB System by using Multi-Objective Genetic Algorithm by Yazdi, H.M., Ramli Sulong, N.H.

    Published 2009
    “…In this study, a new method for designing a particular braced system by using multi-objective genetic algorithm is proposed. …”
    Get full text
    Get full text
    Article
  19. 19

    Enhancement of cryptography and transform domain in steganography for higher embedding capacity by Khalaf, Emad T

    Published 2012
    “…In the field of Data Communication, security issues are the top priority.Cryptography and steganography address the necessary elements for secure communication namely privacy, confidentiality,key exchange,authentication,and non-repudiation but reveals the fact that communication is happening.This study proposes a combination of Steganography and Cryptography to enhance security of the transmitted information.Hence this work is composed of two parts:cryptographic and steganographic.In the cryptographic part,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key with large data block,and also extending it by including the special characters and digits.For the steganographic part,a new method has been proposed by combining Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT),to take the advantageous of both algorithms.The original image is decomposed into four bands using the Haar wavelet LL,HL,LH and HH.Three of these sub-bands have been selected to hiding data (LH,HL and HH)which are less effect to the image than LL sub-band.Then,DCT transform is applied to the selected DWT sub-band,the process of hiding will be in the least significant bit of the DCT coefficients to each sub-band. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    3D coordinate transformation using molodensky badekas transformation model: MBT07 by Phang, Seng Boon, Setan, Halim

    Published 2007
    “…Transformations between coordinate systems are routinely carried out in surveying. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item