Search Results - (( data application system algorithm ) OR ( data equalization based algorithm ))

Refine Results
  1. 1
  2. 2

    Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems by Marzook, Ali Kamil, Ismail, Alyani, Mohd Ali, Borhanuddin, Sali, Aduwati, Khalaf, Mohannad H., Khatun, Sabira

    Published 2013
    “…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
    Get full text
    Get full text
    Article
  3. 3

    Reduced-rank technique for joint channel estimation in TD-SCDMA systems. by Ismail, Alyani, Sali, Aduwati, Mohd Ali, Borhanuddin, Khatun, Sabira

    Published 2013
    “…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
    Get full text
    Get full text
    Article
  4. 4

    Improved power output forecastingtechnique for effective battery management in photovoltaic system / Utpal Kumar Das by Utpal, Kumar Das

    Published 2019
    “…In addition, a novel data preparation algorithm is also developed to prepare the solar irradiance (SI) pattern of the forecasted day for forecasting PV output power based on the online-weather-report. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    An enhancement of classification technique based on rough set theory for intrusion detection system application by Noor Suhana, Sulaiman

    Published 2019
    “…Thus, to deal with huge dataset, data mining technique can be improved by introducing discretization algorithm to increase classification performance. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Modified HOS based Eigenvector algorithm for improvement of poor SNR of Seismic data by A.F.M., Hani, M.S., Younis

    Published 2007
    “…Convolutional noise makes it difficult to identify the closely spaced bedding. Proposed blind equalization technique is based on the eigenvector algorithm [17], certain modifications are incorporated to reduce the MMSE, max. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…In the implementation phase, Bubble Sort, Euclidean Distance, 10-Fold Cross validation, and K Nearest Neighbor algorithm are developed. This application is using the data from a Taiwan bank which is obtained from the UCI data repository website. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Network reconfiguration and control for loss reduction using genetic algorithm by Jawad, Mohamed Hassan Izzaldeen

    Published 2010
    “…The network reconfiguration problem is formulated as single objective optimization problem with equality and inequality constraints. The proposed solution to this problem is based on a general combinatorial optimization algorithm known as Genetic Algorithm, and the load flow equations in distribution network. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant by Morshidi, Malik Arman

    Published 2007
    “…In this research, a vision system algorithm has been developed to identify and locate base of young corn trees based upon robot vision technology, pattern recognition techniques, and knowledge-based decision theory. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A comparison of watermarking image quality based on dual intermediate significant bit with genetic algorithm by Yasin, Azman, M. Zeki, Akram, Mohammed, Ghassan N.

    Published 2013
    “…The quality of the watermarked images is considered as one of the most important requirements of any watermarking system.In most applications, the watermarking algorithm embeds the watermark without affecting the quality of the host media.In this study, a comparison of watermarking image quality was performed between two existing methods: Dual Intermediate Significant Bit (DISB) an d Genetic Algorithm (GA).The first method focuses on the high quality of the watermarked image based on DISB model and this method requires embedding two bits into every pixel of the original image, while the other six bits are modified so as to immediately assimilate the original pixel. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    An energy based cluster head selection unequal clustering algorithm with dual sink (ECH-DUAL) for continuous monitoring applications in wireless sensor networks by Alagirisamy, Mukil, Chow, Chee Onn

    Published 2018
    “…In our algorithm, tentative cluster head is selected based on energy based timer, residual energy, node IDs and trust value. …”
    Get full text
    Get full text
    Article
  13. 13

    Deterministic Mutation Algorithm As A Winner Over Forward Selection Procedure by Md Fahmi, Abd Samad

    Published 2016
    “…To allow for fair comparison, DMA was altered so as to equalize its strength, where applicable, to that of FSP. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff by Fatin Nabila , Abd Latiff

    Published 2021
    “…In this thesis, the second part of chaos-based secure communication is introducing a new encryption algorithm to improve the security of modern chaos-based communication systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A HOS-based blind deconvolution algorithm for the improvement of time resolution of mixed phase low SNR seismic data by A.F.M., Hani, M.S., Younis, M.F.M., Halim

    Published 2009
    “…The developed blind equalization technique is primarily based on the EVA for blind equalization, initially to deal with mixed phase non-Gaussian seismic signals. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  16. 16

    High image quality watermarking model by using genetic algorithm by Mohammed, Ghassan N., Yasin, Azman, Zeki, Akram M.

    Published 2012
    “…In this study, Genetic Algorithm (GA) method is used to embed two bits of watermarking data within every pixel of original image and to find the optimal value based on the existing Dual Intermediate Significant Bit (DISB). …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17

    High image quality watermarking model by using genetic algorithm by Mohammed, Ghassan N., Yasin, Azman, Zeki, Akram M.

    Published 2012
    “…Many studies try to enhance the quality by using different techniques and methods.In this study, Genetic Algorithm (GA) method is used to embed two bits of watermarking data within every pixel of original image and to find the optimal value based on the existing Dual Intermediate Significant Bit (DISB).However, if the two embedded bits is equal to the original bits then this means the watermarked image is still the same as the original one without any changing, while in the other case GA is used getting the minimum fitness value in which the fitness is the absolute value between the pixel and chromosome and the value of chromosome between 0-255.The results show that the new method improves the image quality and get the optimal value for the two embedded bits.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18
  19. 19

    GREEDY SINGLE USER AND FAIR MULTIPLE USERS' REPLICA SELECTION DECISION IN DATA GRID by SALIM JARADAT, AYMAN KAMEL

    Published 2013
    “…Replication in data grids increases data availability, accessibility and reliability. …”
    Get full text
    Get full text
    Thesis
  20. 20