Search Results - (( data application using algorithm ) OR ( _ modification using algorithm ))
Search alternatives:
- modification using »
- data application »
- using algorithm »
-
1
-
2
1D Multigrid Solver For Finite Element Method
Published 2022“…The new algorithm also has been tested using time simulation. …”
Get full text
Get full text
Monograph -
3
Analysis and Modification of Grain - 128 Stream Cipher Algorithm
Published 2024thesis::master thesis -
4
An improvement on the valiantbrebner hypercube data broadcasting technique / Nasaruddin Zenon
Published 1990“…In Section 3.0 we will propose a modification to the V-B algorithm. An analysis of the improved algorithm in comparison to te V-B algorithm is provided at the end of section 3.0.…”
Get full text
Get full text
Article -
5
-
6
Detection of multiple outliners in linear regression using nonparametric methods
Published 2004“…Generally, method proposed by Sebert et al. (1998) is based on the use of single linkage clustering algorithm with the Euclidean distances to cluster the points in the plots of standard predicted versus residuals values from a linear regression model. …”
Get full text
Get full text
Monograph -
7
A hybrid metaheuristic algorithm for identification of continuous-time Hammerstein systems
Published 2021“…The proposed hybrid method was used for identifying the parameters of linear and nonlinear subsystems in the Hammerstein model using the given input and output data. …”
Get full text
Get full text
Article -
8
Three-term backpropagation algorithm for classification problem
Published 2006“…Standard Backpropagation Algorithm (BP) is a widely used algorithm in training Neural Network that is proven to be very successful in many diverse application. …”
Get full text
Get full text
Thesis -
9
-
10
-
11
Building an Algorithm for Measuring C Programming Assignments Quality
Published 2008“…The proposed algorithm was modified from an existing approach used to measure software quality known as the cyclomatic measure [6]. …”
Get full text
Get full text
Final Year Project -
12
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…Data integrity is a major concern in IoT technologies, and this issue has started to increase in recent years due to the use of Bluetooth Low Energy (BLE) devices. …”
Get full text
Get full text
Thesis -
13
Identification of continuous-time model of hammerstein system using modified multi-verse optimizer
Published 2021“…Multi-Verse Optimizer (MVO) is one of the most recent robust nature-inspired metaheuristic algorithm. It has been successfully implemented and used in various areas such as machine learning applications, engineering applications, network applications, parameter control, and other similar applications to solve optimization problems. …”
Get full text
Get full text
Thesis -
14
An improved ACS algorithm for data clustering
Published 2020“…Comparison of the performance of several common clustering algorithms using real-world datasets shows that the accuracy results of the proposed algorithm surpasses other algorithms.…”
Get full text
Get full text
Get full text
Article -
15
Extensions to the K-AMH algorithm for numerical clustering
Published 2018“…It can also be used to cluster numerical values with minimum modification to the original algorithm. …”
Get full text
Get full text
Get full text
Article -
16
Modifying iEclat algorithm for infrequent patterns mining
Published 2018“…A few parts of this algorithm need a modification to assure that it is suitable for mining infrequent pattern. …”
Get full text
Get full text
Conference or Workshop Item -
17
MotionSure: a cloud-based algorithm for detection of injected object in data in motion
Published 2017“…Total 1600 different type of files were used for evaluation of the proposed algorithm, results show that 87% of injected objects were correctly detected…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Prediction of UPSR Result using clonal selection algorithm (PUR) / Muhammed Khaleeq Shafii
Published 2012“…This project focuses on three main objectives to investigate the UPSR Examination of data for prediction result, to study the Clonal Selection algorithm of the term and to develop the Prediction of UPSR Result System using Clonal Selection Algorithm. …”
Get full text
Get full text
Thesis -
19
An improved image steganography algorithm based on PVD
Published 2018“…In this paper, a modification of PVD (Pixel Value Differencing) algorithm is used for Image Steganography in spatial domain. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Balancing exploration and exploitation in ACS algorithms for data clustering
Published 2019“…The performance of the proposed algorithm is compared with that of several common clustering algorithms using real-world datasets. …”
Get full text
Get full text
Get full text
Article
