Search Results - (( data application system algorithm ) OR ( data equalization based algorithm ))
Search alternatives:
- data equalization »
- data application »
- system algorithm »
-
1
Application of Bat Algorithm and Its Modified Form Trained with ANN in Channel Equalization
Published 2022“…An alternative approach to training neural network-based equalizers is to use metaheuristic algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
2
Reduced rank technique for joint channel estimation and joint data detection in TD-SCDMA systems
Published 2013“…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
Get full text
Get full text
Article -
3
Reduced-rank technique for joint channel estimation in TD-SCDMA systems.
Published 2013“…The detectors: zero forcing block linear equalizer and minimum mean square error block linear equalizer algorithms are considered in this paper to recover the data. …”
Get full text
Get full text
Article -
4
Improved power output forecastingtechnique for effective battery management in photovoltaic system / Utpal Kumar Das
Published 2019“…In addition, a novel data preparation algorithm is also developed to prepare the solar irradiance (SI) pattern of the forecasted day for forecasting PV output power based on the online-weather-report. …”
Get full text
Get full text
Get full text
Thesis -
5
An enhancement of classification technique based on rough set theory for intrusion detection system application
Published 2019“…Thus, to deal with huge dataset, data mining technique can be improved by introducing discretization algorithm to increase classification performance. …”
Get full text
Get full text
Thesis -
6
Modified HOS based Eigenvector algorithm for improvement of poor SNR of Seismic data
Published 2007“…Convolutional noise makes it difficult to identify the closely spaced bedding. Proposed blind equalization technique is based on the eigenvector algorithm [17], certain modifications are incorporated to reduce the MMSE, max. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi
Published 2017“…In the implementation phase, Bubble Sort, Euclidean Distance, 10-Fold Cross validation, and K Nearest Neighbor algorithm are developed. This application is using the data from a Taiwan bank which is obtained from the UCI data repository website. …”
Get full text
Get full text
Thesis -
8
Network reconfiguration and control for loss reduction using genetic algorithm
Published 2010“…The network reconfiguration problem is formulated as single objective optimization problem with equality and inequality constraints. The proposed solution to this problem is based on a general combinatorial optimization algorithm known as Genetic Algorithm, and the load flow equations in distribution network. …”
Get full text
Get full text
Thesis -
9
Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant
Published 2007“…In this research, a vision system algorithm has been developed to identify and locate base of young corn trees based upon robot vision technology, pattern recognition techniques, and knowledge-based decision theory. …”
Get full text
Get full text
Thesis -
10
A comparison of watermarking image quality based on dual intermediate significant bit with genetic algorithm
Published 2013“…The quality of the watermarked images is considered as one of the most important requirements of any watermarking system.In most applications, the watermarking algorithm embeds the watermark without affecting the quality of the host media.In this study, a comparison of watermarking image quality was performed between two existing methods: Dual Intermediate Significant Bit (DISB) an d Genetic Algorithm (GA).The first method focuses on the high quality of the watermarked image based on DISB model and this method requires embedding two bits into every pixel of the original image, while the other six bits are modified so as to immediately assimilate the original pixel. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
An energy based cluster head selection unequal clustering algorithm with dual sink (ECH-DUAL) for continuous monitoring applications in wireless sensor networks
Published 2018“…In our algorithm, tentative cluster head is selected based on energy based timer, residual energy, node IDs and trust value. …”
Get full text
Get full text
Article -
13
Deterministic Mutation Algorithm As A Winner Over Forward Selection Procedure
Published 2016“…To allow for fair comparison, DMA was altered so as to equalize its strength, where applicable, to that of FSP. …”
Get full text
Get full text
Get full text
Article -
14
Chaos synchronization and cryptography for secure communications / Fatin Nabila Abd Latiff
Published 2021“…In this thesis, the second part of chaos-based secure communication is introducing a new encryption algorithm to improve the security of modern chaos-based communication systems. …”
Get full text
Get full text
Get full text
Thesis -
15
A HOS-based blind deconvolution algorithm for the improvement of time resolution of mixed phase low SNR seismic data
Published 2009“…The developed blind equalization technique is primarily based on the EVA for blind equalization, initially to deal with mixed phase non-Gaussian seismic signals. …”
Get full text
Get full text
Get full text
Citation Index Journal -
16
High image quality watermarking model by using genetic algorithm
Published 2012“…In this study, Genetic Algorithm (GA) method is used to embed two bits of watermarking data within every pixel of original image and to find the optimal value based on the existing Dual Intermediate Significant Bit (DISB). …”
Get full text
Get full text
Get full text
Proceeding Paper -
17
High image quality watermarking model by using genetic algorithm
Published 2012“…Many studies try to enhance the quality by using different techniques and methods.In this study, Genetic Algorithm (GA) method is used to embed two bits of watermarking data within every pixel of original image and to find the optimal value based on the existing Dual Intermediate Significant Bit (DISB).However, if the two embedded bits is equal to the original bits then this means the watermarked image is still the same as the original one without any changing, while in the other case GA is used getting the minimum fitness value in which the fitness is the absolute value between the pixel and chromosome and the value of chromosome between 0-255.The results show that the new method improves the image quality and get the optimal value for the two embedded bits.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
-
19
GREEDY SINGLE USER AND FAIR MULTIPLE USERS' REPLICA SELECTION DECISION IN DATA GRID
Published 2013“…Replication in data grids increases data availability, accessibility and reliability. …”
Get full text
Get full text
Thesis -
20
