Search Results - (( its application need algorithm ) OR ( based applications modified algorithm ))*
Search alternatives:
- applications modified »
- based applications »
- application need »
- its application »
- need algorithm »
-
1
Modifying iEclat algorithm for infrequent patterns mining
Published 2018“…Pattern ruining has been extensively studied in research due to its successful application in several data mining scenarios. …”
Get full text
Get full text
Conference or Workshop Item -
2
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
3
Modifying iEclat algo ithm for infrequent patterns mining
Published 2018“…Pattern ruining has been extensively studied in research due to its successful application in several data mining scenarios. …”
Get full text
Get full text
Conference or Workshop Item -
4
Performance evaluation of Modified Widrow-Hoff ADALINE under effect of photovoltaic with shunt active power filter
Published 2016Get full text
Get full text
Conference or Workshop Item -
5
Solar photovoltaic system based on perturb and observe maximum power point tracking with trapezoidal rule approach under partial shading conditions
Published 2022“…The second is to propose a hybrid MPPT algorithm based on modified P&O algorithm assisted by Extremum Seeking Control (ESC) approach, in order to maximize the extracted PV power under complex PSC. …”
Get full text
Get full text
Get full text
Thesis -
6
A multi-objective particle swarm optimization algorithm based on dynamic boundary search for constrained optimization
Published 2018“…Hence, more difficult benchmark problems must be utilized to validate new algorithms performance. A well-known optimizer, Multi-Objective Particle Swarm Optimizer (MOPSO), has a few weakness that needs to be addressed, specifically its convergence in high dimensional problems and its constraints handling capability. …”
Get full text
Get full text
Article -
7
Microcrack Detection And Noise Reduction In Integrated Circuit Packages
Published 2018Get full text
Get full text
Monograph -
8
-
9
New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique
Published 2016“…Evaluation is based on the algorithm performances in terms of the search points needed to find the final motion vector, the Peak-Signal to Noise Ratio (PSNR) of the algorithms, and the runtime performance of algorithm simulations. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Development of optimization Alghorithm for uncertain non-linear dynamical system
Published 2004Get full text
Get full text
Monograph -
11
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…This research aim is to study the performance of an improvised Genetic Algorithm (GA) by formulating its problem-specific algorithm for network intrusion problem. …”
Get full text
Get full text
Thesis -
12
Reactive memory model for ant colony optimization and its application to TSP
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
14
Improvement of fuzzy neural network using mine blast algorithm for classification of Malaysian Small Medium Enterprises based on strength
Published 2015“…Mine Blast Algorithm (MBA) which has been improved by Improved MBA (IMBA) can be further improved by modifying its exploitation phase. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
Published 2018“…Since AODV has no security mechanisms, malicious nodes can perform many attacks just by not behaving according to the AODV rules, so that our framework can provide secure communication in VANET via modifying AODV. Our framework categorises the requirements for the VANET protection design via modifying AODV into three: Insure the Availability of VANET and its Services Algorithm (IAVSA), Protect Data Dissemination Algorithm (PDDA), and Secure Vehicles Authentication Algorithm (SVAA). …”
Get full text
Get full text
Get full text
Thesis -
16
A Hybrid Approach For Web Search Result Clustering Based On Genetic Algorithm With K-means
Published 2024Get full text
journal::journal article -
17
-
18
Assist-as-needed control strategy for upper-limb rehabilitation based on subject’s functional ability
Published 2019“…Our baseline controller is an adaptive inertia-related controller, which is integrated with the functional ability index algorithm to provide movement assistance as when needed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
