Search Results - (( cover selection method algorithm ) OR ( based information needs algorithm ))
Search alternatives:
- based information »
- selection method »
- method algorithm »
- cover selection »
- needs algorithm »
-
1
Spectral discrimination and index development of roofing materials and conditions using field spectroscopy and worldview-3 satellite image
Published 2016“…Three feature selection algorithms of Genetic Algorithm (GA), Support Vector Machine (SVM) and Random Forest (RF) were used to select the most significant wavelengths since the algorithms works well with large size of data and widely applied for feature selection of hyperspectral remote sensing data. …”
Get full text
Get full text
Thesis -
2
Optimized Cover Selection for Audio Steganography Using Multi-Objective Evolutionary Algorithm
Published 2023“…In conclusion, the method optimised the cover audio selected, thus, improving the effectiveness of the audio steganography used. …”
Get full text
Get full text
Get full text
Article -
3
Enhancement Of Cover Selection – Based Audio Steganography (CAS) Using Block-Based Chaotic Multi – Level Lsb (BCM– LSB) For Balanced Performance
Published 2024thesis::doctoral thesis -
4
Multi-hop and mesh for LoRa networks: Recent advancements, issues, and recommended applications
Published 2024“…Security is still a major concern for LoRa networks, particularly on attacks such as Man-In-The-Middle (MITM), spoofing, wormholes, flooding, packet replay, and information disclosure. The upcoming trend of implementing machine learning algorithms to multi-hop and mesh LoRa networks opens up a wide range of possibilities, ranging from airspace efficiency, efficient route selection, and improving data throughput. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Approximate maximum clique algorithm (AMCA): A clever technique for solving the maximum clique problem through near optimal algorithm for minimum vertex cover problem
Published 2018“…Material and methods: To test the proposed technique, selected approximation algorithms have been developed to small graph instances. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
A Systematic Review on Cover Selection Methods For Steganography: Trend Analysis, Novel Classification and Analysis of the Elements
Published 2026journal::journal article -
7
-
8
Model structure selection for a discrete-time non-linear system using genetic algorithm
Published 2004“…The results show that the proposed algorithm can be employed as an algorithm to select the structure of the proposed model.…”
Get full text
Get full text
Get full text
Article -
9
Model structure selection for a discrete-time non-linear system using a genetic algorithm
Published 2004“…The results show that the proposed algorithm can be employed as an algorithm to select the structure of the proposed model.…”
Get full text
Get full text
Article -
10
Model structure selection for a discrete-time non-linear system using a genetic algorithm
Published 2004“…The results show that the proposed algorithm can be employed as an algorithm to select the structure of the proposed model.…”
Get full text
Get full text
Article -
11
Regression test case selection & prioritization using dependence graph and genetic algorithm
Published 2014“…It was shown that our approach needs 30% of the test cases to cover all the faults, while 80% is needed to cover all the faults using retest-all, which is time consuming and costly.…”
Get full text
Get full text
Article -
12
Implementation of AES algorithm into information investigation autopsy (IIA) / Ahmad Wafiy Hamad Zaki
Published 2013“…Information Investigation Autopsy (IIA) is the tools that can captured the information needed on the Local Area Network environment and later needed to be secured, the IIA need a module that can to secure the evidence captured from any harm. …”
Get full text
Get full text
Student Project -
13
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
Get full text
Get full text
Thesis -
14
-
15
Agent-based extraction algorithm for computational problem solving
Published 2015“…The tool is used to evaluate the accuracy of the proposed extraction algorithm to extract the appropriate information which are needed. …”
Get full text
Get full text
Thesis -
16
Model structure selection for a discrete-time non-linear system using a genetic algorithm
Published 2004“…The results show that the proposed algorithm can be employed as an algorithm to select the structure of the proposed model.…”
Get full text
Get full text
Article -
17
-
18
TRIP PLANNER MOBILE APPLICATION FOR SARAWAK TOURIST WITH USING INTELLIGENT AGENT BASED DECISION MAKING ALGORITHMS
Published 2020“…Nowadays, technology has become an essential need in almost every aspect of our lives. The internet becomes the main source of information for user to plan the trip. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
19
Selection of access network using cost function method in heterogeneous wireless network
Published 2014“…This method covers the weight distribution and cost factor techniques.The weight distribution is used to measure different weights for existing wireless network based on the user's preference and mobile terminal power.The cost factor technique is also used to identify the cost for performing handover target by considering every network parameters and its weight.Results obtained showed that the algorithm has the ability to increase user's satisfaction compared to other algorithms, which consistently choose one accessible network.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
What drives Chinese youth to use fitness-related health information on social media? an analysis of intrinsic needs, social media algorithms, and source credibility
Published 2024“…Additionally, social media algorithms moderated the relationship between the need for relatedness and fitness-related health information behavior. …”
Get full text
Get full text
Get full text
Article
