Search Results - (( new evaluation based algorithm ) OR ( based instruction ((bees algorithm) OR (_ algorithm)) ))
Search alternatives:
- evaluation based »
- new evaluation »
- bees algorithm »
-
1
Crytojacking Classification based on Machine Learning Algorithm
Published 2024journal::journal article -
2
Selection and optimization of peak features for event-related eeg signals classification / Asrul bin Adam
Published 2017“…However, the developed algorithms only consider the selected features from a peak model based on the understanding of the EEG signals characteristics. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
Optimizing large scale combinatorial problems using multiple ant colonies algorithm based on pheromone evaluation technique
Published 2008“…The new algorithm is based on the ant colony system and utilizes average and maximum pheromone evaluation mechanisms. …”
Get full text
Get full text
Get full text
Article -
5
RISC-V instruction set extension on blockchain application
Published 2024“…This project is an instruction set extension project based on RISC-V architecture for academic purpose. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Multi-base number representation in application to scalar multiplication and pairing computation
Published 2011“…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
Get full text
Get full text
Thesis -
7
A new multiple ant colonies optimization algorithm utilizing average pheromone evaluation mechanism
Published 2008“…Computational tests show promises of the new algorithm.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Cache replacement algorithm using hierarchical allocation scheduling
Published 2014“…HAS is to schedule the instructions based on the priority of instructions from the aspect of space and time. …”
Get full text
Get full text
Thesis -
9
-
10
PMT : opposition based learning technique for enhancing metaheuristic algorithms performance
Published 2020“…Like existing OBL-based approaches, the PMT generates new potential solutions based on the currently selected candidate. …”
Get full text
Get full text
Thesis -
11
-
12
DESIGN AND EVALUATION OF RESOURCE ALLOCATION AND JOB SCHEDULING ALGORITHMS ON COMPUTATIONAL GRIDS
Published 2012“…The issue is not only to develop new algorithms, but also to evaluate them on an experimental computational grid, using synthetic and real workload traces, along with the other existing job scheduling algorithms. …”
Get full text
Get full text
Thesis -
13
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…This separation contributes in determining the effect of access point on the network performance as well as it allows in evaluating the algorithms that based on the differentiation between the access point and stations. …”
Get full text
Get full text
Get full text
Thesis -
14
A new multiperspective framework for standardization and benchmarking of image dehazing algorithms
Published 2021“…Second, an evaluation experiment was conducted to obtain a new multi-perspective decision matrix. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
PMT: opposition-based learning technique for enhancing meta-heuristic performance
Published 2019“…Like existing OBL-based approaches, the PMT generates new potential solutions based on the currently selected candidate. …”
Get full text
Get full text
Get full text
Article -
16
-
17
A new standardisation and selection framework for real-time image dehazing algorithms from multi-foggy scenes based on fuzzy Delphi and hybrid multi-criteria decision analysis meth...
Published 2020“…Firstly, the image dehazing criteria are standardised based on FDM. Secondly, an evaluation experiment is conducted based on standardised criteria and nine real-time image dehazing algorithms to obtain a multi-perspective matrix. …”
Get full text
Get full text
Get full text
Article -
18
A block cipher based on genetic algorithm
Published 2016“…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
Get full text
Get full text
Get full text
Thesis -
19
-
20
