Search Results - (( its application need algorithm ) OR ( based applications modified algorithm ))*

Refine Results
  1. 1

    Modifying iEclat algorithm for infrequent patterns mining by Julaily Aida, J., Mustafa, M.

    Published 2018
    “…Pattern ruining has been extensively studied in research due to its successful application in several data mining scenarios. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Modified Data Encryption Standard Algorithm for Textbased Applications by Mohamed Khmag, Asem Ib.

    Published 2006
    “…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Modifying iEclat algo ithm for infrequent patterns mining by Julaily Aida, Jusoh, Mustafa, Man

    Published 2018
    “…Pattern ruining has been extensively studied in research due to its successful application in several data mining scenarios. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Solar photovoltaic system based on perturb and observe maximum power point tracking with trapezoidal rule approach under partial shading conditions by Altwallbah, Neda Mahmod Mohammad.

    Published 2022
    “…The second is to propose a hybrid MPPT algorithm based on modified P&O algorithm assisted by Extremum Seeking Control (ESC) approach, in order to maximize the extracted PV power under complex PSC. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    A multi-objective particle swarm optimization algorithm based on dynamic boundary search for constrained optimization by Mohd Zain, Mohamad Zihin, Kanesan, Jeevan, Chuah, Joon Huang, Dhanapal, Saroja, Kendall, Graham

    Published 2018
    “…Hence, more difficult benchmark problems must be utilized to validate new algorithms performance. A well-known optimizer, Multi-Objective Particle Swarm Optimizer (MOPSO), has a few weakness that needs to be addressed, specifically its convergence in high dimensional problems and its constraints handling capability. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique by Hamid, Nurul 'Atiqah

    Published 2016
    “…Evaluation is based on the algorithm performances in terms of the search points needed to find the final motion vector, the Peak-Signal to Noise Ratio (PSNR) of the algorithms, and the runtime performance of algorithm simulations. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi by Suhaimi, Hamizan

    Published 2021
    “…This research aim is to study the performance of an improvised Genetic Algorithm (GA) by formulating its problem-specific algorithm for network intrusion problem. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Improvement of fuzzy neural network using mine blast algorithm for classification of Malaysian Small Medium Enterprises based on strength by Hussain Talpur, Kashif

    Published 2015
    “…Mine Blast Algorithm (MBA) which has been improved by Improved MBA (IMBA) can be further improved by modifying its exploitation phase. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector by Abdulkader, Zaid A.

    Published 2018
    “…Since AODV has no security mechanisms, malicious nodes can perform many attacks just by not behaving according to the AODV rules, so that our framework can provide secure communication in VANET via modifying AODV. Our framework categorises the requirements for the VANET protection design via modifying AODV into three: Insure the Availability of VANET and its Services Algorithm (IAVSA), Protect Data Dissemination Algorithm (PDDA), and Secure Vehicles Authentication Algorithm (SVAA). …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Assist-as-needed control strategy for upper-limb rehabilitation based on subject’s functional ability by Ahmed Mounis, Shawgi Younis, Zainul Azlan, Norsinnira, Sado, Fatai

    Published 2019
    “…Our baseline controller is an adaptive inertia-related controller, which is integrated with the functional ability index algorithm to provide movement assistance as when needed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20