Search Results - (( cover selection methods algorithm ) OR ( based information flow algorithm ))

Refine Results
  1. 1

    Imaging of solid flow in a gravity flow rig using infra-red tomography by Md. Yunus, Mohd. Amri

    Published 2005
    “…Information on flow regimes is vital in the analysis and measurement of industrial process flow. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Optimized Cover Selection for Audio Steganography Using Multi-Objective Evolutionary Algorithm by Noor Azam, Muhammad Harith, Ridzuan, Farida, Mohd Sayuti, M Norazizi Sham

    Published 2023
    “…In conclusion, the method optimised the cover audio selected, thus, improving the effectiveness of the audio steganography used. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

    Model structure selection for a discrete-time non-linear system using genetic algorithm by Ahmad, Robiah, Jamaluddin , Hishamuddin, Hussain, Mohd. Azlan

    Published 2004
    “…The results show that the proposed algorithm can be employed as an algorithm to select the structure of the proposed model.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Model structure selection for a discrete-time non-linear system using a genetic algorithm by Ahmad, R., Jamaluddin, H., Hussain, M. A.

    Published 2004
    “…The results show that the proposed algorithm can be employed as an algorithm to select the structure of the proposed model.…”
    Get full text
    Get full text
    Article
  9. 9

    Model structure selection for a discrete-time non-linear system using a genetic algorithm by Ahmad, R., Jamaluddin, H., Hussain, M. A.

    Published 2004
    “…The results show that the proposed algorithm can be employed as an algorithm to select the structure of the proposed model.…”
    Get full text
    Get full text
    Article
  10. 10

    Hardware development of ultrasonics tomography for composition determination of water and oil flow by Abdul Rahim, Ruzairi, Ng, Wei Nyap, Fazalul Rahiman, Mohd. Hafiz

    Published 2007
    “…The composition of the flow is determined based on the propagation time of the ultrasonic waves. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Precise ICMP Traceback Based On Normal Flow Filtration in Denial of Services Attack by Izaddoost, Alireza

    Published 2008
    “…To achieve such a goal, this research improves the Intention-driven ICMP traceback model by filtering normal flow in the specific short time and two new algorithms in UDP-based and TCP-based attack are applied. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Treemap algorithm for dynamic stormwater infiltration movement into soil surface by Siti Nurbaidzuri, Binti Reli @ Raily, Izham, Mohamad Yusoff, Habibah, Lateh, Muhamad Uznir, Ujang

    Published 2015
    “…Tree algorithm is used to re-class and provides hierarchical depth of the soil where the depth are divided into five hierarchies (40cm, 80cm, 120cm, 160cm and 20cm) based on subsurface flow wetting range. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  15. 15

    Treemap algorithm for dynamic stormwater infiltration movement into soil surface by Reli, Siti Nurbaidzuri, Yusoff, Izham Mohamad, Lateh, Habibah, Ujang, Uznir

    Published 2015
    “…Tree algorithm is used to re-class and provides hierarchical depth of the soil where the depth are divided into five hierarchies (40cm, 80cm, 120cm, 160cm and 20cm) based on subsurface flow wetting range. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Regression test case selection & prioritization using dependence graph and genetic algorithm by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2014
    “…It was shown that our approach needs 30% of the test cases to cover all the faults, while 80% is needed to cover all the faults using retest-all, which is time consuming and costly.…”
    Get full text
    Get full text
    Article
  17. 17

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Model structure selection for a discrete-time non-linear system using a genetic algorithm by Ahmad, R., Jamaluddin, H., Hussain, Mohd Azlan

    Published 2004
    “…The results show that the proposed algorithm can be employed as an algorithm to select the structure of the proposed model.…”
    Get full text
    Get full text
    Article
  20. 20